WorldWideScience

Sample records for network advisory message

  1. ITS Standards Advisory : Dynamic Message Signs (DMS)

    Science.gov (United States)

    2003-01-01

    ITS Standards Advisories provide the transportation community with information and guidance on key activities related to ITS standards, with each Advisory focusing on a single ITS application and its corresponding standards. This advisory focuses on ...

  2. Message network simulation

    OpenAIRE

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy

  3. Message framing in social networking sites.

    Science.gov (United States)

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  4. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  5. Message transfer in a communication network

    Indian Academy of Sciences (India)

    Examples of transport processes on networks include the traffic of informa- tion packets [1–4], transport processes on biological networks [5,6], and road traffic. ... for this system. In the case of single message transfer, we study the dependence of average travel times on the hub density, and find that travel times fall off as a.

  6. Message Integrity Model for Wireless Sensor Networks

    Science.gov (United States)

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  7. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed

    2013-05-01

    Multicopy routing strategies have been considered the most applicable approaches to achieve message delivery in Delay Tolerant Networks (DTNs). Epidemic routing and two-hop forwarding routing are two well-reported approaches for delay tolerant networks routing which allow multiple message replicas to be launched in order to increase message delivery ratio and/or reduce message delivery delay. This advantage, nonetheless, is at the expense of additional buffer space and bandwidth overhead. Thus, to achieve efficient utilization of network resources, it is important to come up with an effective message scheduling strategy to determine which messages should be forwarded and which should be dropped in case of buffer is full. This paper investigates a new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive simulation results show that the proposed message scheduling framework can achieve better performance than its counterparts.

  8. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  9. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  10. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  11. Interarrival times of message propagation on directed networks

    Science.gov (United States)

    Mihaljev, Tamara; de Arcangelis, Lucilla; Herrmann, Hans J.

    2011-08-01

    One of the challenges in fighting cybercrime is to understand the dynamics of message propagation on botnets, networks of infected computers used to send viruses, unsolicited commercial emails (SPAM) or denial of service attacks. We map this problem to the propagation of multiple random walkers on directed networks and we evaluate the interarrival time distribution between successive walkers arriving at a target. We show that the temporal organization of this process, which models information propagation on unstructured peer to peer networks, has the same features as SPAM reaching a single user. We study the behavior of the message interarrival time distribution on three different network topologies using two different rules for sending messages. In all networks the propagation is not a pure Poisson process. It shows universal features on Poissonian networks and a more complex behavior on scale free networks. Results open the possibility to indirectly learn about the process of sending messages on networks with unknown topologies, by studying interarrival times at any node of the network.

  12. Secure message authentication system for node to node network

    Science.gov (United States)

    Sindhu, R.; Vanitha, M. M.; Norman, J.

    2017-10-01

    The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.

  13. ANALYSIS OF MARKOV NETWORK WITH INCOMES, POSITIVE AND NEGATIVE MESSAGES

    Directory of Open Access Journals (Sweden)

    V. V. Naumenko

    2014-01-01

    Full Text Available Markov queuing network with income in transient regime is considered. It has positive and negative messages, which can be used in forecasting income of information and telecommunication systems and networks affected by viruses. Investigations are carried out in the cases when incomes from transitions between network states are deterministic functions dependent on states, or they are random variables with given mean values. In the last case it is assumed that all network systems operate in a high load mode. An example is given.

  14. Emotion homophily in social network site messages

    OpenAIRE

    Thelwall, Mike

    2010-01-01

    Social network sites (SNS) like MySpace seem to play a role in friendships and wider relationships for many people. Emotion expression can be important in relationship maintenance but little is known about the role of emotion in SNSs, other than positive comments being widespread in MySpace. But is emotion typically reciprocated, and do Friends express and/or receive similar levels of emotion expression to each other? Based upon an analysis of over two million MySpace public comments associat...

  15. Statistics of Epidemics in Networks by Passing Messages

    Science.gov (United States)

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result

  16. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Committee Name: Homeland Security Information.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...

  17. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    García JoséAPérez

    2008-01-01

    Full Text Available Abstract Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  18. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    Omar Jehovani López Orozco

    2007-12-01

    Full Text Available Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  19. Reaching adolescent girls through social networking: a new avenue for smoking prevention messages.

    Science.gov (United States)

    Struik, Laura Louise; Bottorff, Joan L; Jung, Mary; Budgen, Claire

    2012-09-01

    Because adolescent girls are being targeted on social networking sites by the tobacco industry, new online tobacco control (TC) initiatives are needed. The purpose of this interpretive descriptive study was to explore adolescent girls' perspectives on the use of social networking sites to deliver TC messages targeting young women. Focus groups were conducted with 17 girls aged 16 to 19. Seven TC messages were provided for evaluation and as context for discussion about the delivery of TC messages on social networking sites. Data were analyzed for themes, which included concerns about the effectiveness of current TC messages and the stereotypical representations of gender, factors perceived to influence the effectiveness of TC messages on social networking sites, and suggestions for enhancing the effectiveness of TC messages placed on social networking sites. Endorsement of TC messaging on social networking sites suggests that this medium is an untapped resource for smoking prevention.

  20. Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks

    Science.gov (United States)

    Banani, Sam; Thiemjarus, Surapa; Kittipiyakul, Somsak

    2018-01-01

    In high-density road networks, with each vehicle broadcasting multiple messages per second, the arrival rate of safety messages can easily exceed the rate at which digital signatures can be verified. Since not all messages can be verified, algorithms for selecting which messages to verify are required to ensure that each vehicle receives appropriate awareness about neighbouring vehicles. This paper presents a novel scheme to select important safety messages for verification in vehicular ad hoc networks (VANETs). The proposed scheme uses location and direction of the sender, as well as proximity and relative-time between vehicles, to reduce the number of irrelevant messages verified (i.e., messages from vehicles that are unlikely to cause an accident). Compared with other existing schemes, the analysis results show that the proposed scheme can verify messages from nearby vehicles with lower inter-message delay and reduced packet loss and thus provides high level of awareness of the nearby vehicles. PMID:29652840

  1. Flow of emotional messages in artificial social networks

    OpenAIRE

    Chmiel, Anna; Holyst, Janusz A.

    2010-01-01

    Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account t...

  2. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Naik, K.; Shihada, Basem

    2013-01-01

    new message scheduling framework for epidemic and two-hop forwarding routing in DTNs, such that the forwarding/dropping decision can be made at a node during each contact for either optimal message delivery ratio or message delivery delay. Extensive

  3. Control mechanism to prevent correlated message arrivals from degrading signaling no. 7 network performance

    Science.gov (United States)

    Kosal, Haluk; Skoog, Ronald A.

    1994-04-01

    Signaling System No. 7 (SS7) is designed to provide a connection-less transfer of signaling messages of reasonable length. Customers having access to user signaling bearer capabilities as specified in the ANSI T1.623 and CCITT Q.931 standards can send bursts of correlated messages (e.g., by doing a file transfer that results in the segmentation of a block of data into a number of consecutive signaling messages) through SS7 networks. These message bursts with short interarrival times could have an adverse impact on the delay performance of the SS7 networks. A control mechanism, Credit Manager, is investigated in this paper to regulate incoming traffic to the SS7 network by imposing appropriate time separation between messages when the incoming stream is too bursty. The credit manager has a credit bank where credits accrue at a fixed rate up to a prespecified credit bank capacity. When a message arrives, the number of octets in that message is compared to the number of credits in the bank. If the number of credits is greater than or equal to the number of octets, then the message is accepted for transmission and the number of credits in the bank is decremented by the number of octets. If the number of credits is less than the number of octets, then the message is delayed until enough credits are accumulated. This paper presents simulation results showing delay performance of the SS7 ISUP and TCAP message traffic with a range of correlated message traffic, and control parameters of the credit manager (i.e., credit generation rate and bank capacity) are determined that ensure the traffic entering the SS7 network is acceptable. The results show that control parameters can be set so that for any incoming traffic stream there is no detrimental impact on the SS7 ISUP and TCAP message delay, and the credit manager accepts a wide range of traffic patterns without causing significant delay.

  4. Flow of Emotional Messages in Artificial Social Networks

    Science.gov (United States)

    Chmiel, Anna; Hołyst, Janusz A.

    Models of message flows in an artificial group of users communicating via the Internet are introduced and investigated using numerical simulations. We assumed that messages possess an emotional character with a positive valence and that the willingness to send the next affective message to a given person increases with the number of messages received from this person. As a result, the weights of links between group members evolve over time. Memory effects are introduced, taking into account that the preferential selection of message receivers depends on the communication intensity during the recent period only. We also model the phenomenon of secondary social sharing when the reception of an emotional e-mail triggers the distribution of several emotional e-mails to other people.

  5. 75 FR 79440 - Financial Crimes Enforcement Network; Bank Secrecy Act Advisory Group; Solicitation of...

    Science.gov (United States)

    2010-12-20

    ... DEPARTMENT OF THE TREASURY Financial Crimes Enforcement Network; Bank Secrecy Act Advisory Group; Solicitation of Application for Membership AGENCY: Financial Crimes Enforcement Network, Department of the... financial institutions and trade groups for membership on the Bank Secrecy Act Advisory Group. New members...

  6. Shaping guanxi networks at work through instant messaging

    NARCIS (Netherlands)

    Ou, Carol; Davison, R.M.

    Instant messaging (IM) has become increasingly prevalent in social life. However, the use of IM at work remains controversial, owing to its unclear benefits to organizations. In this study, we employ media performance theories and the concept model of communicative ecology to examine the impact of

  7. Affective and executive network processing associated with persuasive antidrug messages.

    Science.gov (United States)

    Ramsay, Ian S; Yzer, Marco C; Luciana, Monica; Vohs, Kathleen D; MacDonald, Angus W

    2013-07-01

    Previous research has highlighted brain regions associated with socioemotional processes in persuasive message encoding, whereas cognitive models of persuasion suggest that executive brain areas may also be important. The current study aimed to identify lateral prefrontal brain areas associated with persuasive message viewing and understand how activity in these executive regions might interact with activity in the amygdala and medial pFC. Seventy adolescents were scanned using fMRI while they watched 10 strongly convincing antidrug public service announcements (PSAs), 10 weakly convincing antidrug PSAs, and 10 advertisements (ads) unrelated to drugs. Antidrug PSAs compared with nondrug ads more strongly elicited arousal-related activity in the amygdala and medial pFC. Within antidrug PSAs, those that were prerated as strongly persuasive versus weakly persuasive showed significant differences in arousal-related activity in executive processing areas of the lateral pFC. In support of the notion that persuasiveness involves both affective and executive processes, functional connectivity analyses showed greater coactivation between the lateral pFC and amygdala during PSAs known to be strongly (vs. weakly) convincing. These findings demonstrate that persuasive messages elicit activation in brain regions responsible for both emotional arousal and executive control and represent a crucial step toward a better understanding of the neural processes responsible for persuasion and subsequent behavior change.

  8. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    Energy Technology Data Exchange (ETDEWEB)

    Sachpazidis, Ilias [Fraunhofer Institute for Computer Graphics, Fraunhoferstr. 5, D-64283, Darmstadt (Germany)]. E-mail: Ilias.Sachpazidis@igd.fraunhofer.de; Ohl, Roland [MedCom Gesellschaft fuer medizinische Bildverarbeitung mbH, Runderturmstr. 12, D-64283, Darmstadt (Germany); Kontaxakis, George [Universidad Politecnica de Madrid, ETSI Telecomunicacion, Madrid 28040 (Spain); Sakas, Georgios [Fraunhofer Institute for Computer Graphics, Fraunhoferstr. 5, D-64283, Darmstadt (Germany)

    2006-12-20

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  9. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    Science.gov (United States)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-12-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  10. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    International Nuclear Information System (INIS)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-01-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber

  11. The model of microblog message diffusion based on complex social network

    Science.gov (United States)

    Zhang, Wei; Bai, Shu-Ying; Jin, Rui

    2014-05-01

    Microblog is a micromessage communication network in which users are the nodes and the followship between users are the edges. Sina Weibo is a typical case of these microblog service websites. As the enormous scale of nodes and complex links in the network, we choose a sample network crawled in Sina Weibo as the base of empirical analysis. The study starts with the analysis of its topological features, and brings in epidemiological SEIR model to explore the mode of message spreading throughout the microblog network. It is found that the network is obvious small-world and scale-free, which made it succeed in transferring messages and failed in resisting negative influence. In addition, the paper focuses on the rich nodes as they constitute a typical feature of Sina Weibo. It is also found that whether the message starts with a rich node will not account for its final coverage. Actually, the rich nodes always play the role of pivotal intermediaries who speed up the spreading and make the message known by much more people.

  12. Game Theoretic Analysis of Cooperative Message Forwarding in Opportunistic Mobile Networks.

    Science.gov (United States)

    Pal, Sujata; Saha, Barun Kumar; Misra, Sudip

    2017-12-01

    In cooperative communication, a set of players forming a coalition ensures communal behavior among themselves by helping one another in message forwarding. Opportunistic mobile networks (OMNs) require multihop communications for transferring messages from the source to the destination nodes. However, noncooperative nodes only forward their own messages to others, and drop others' messages upon receiving them. So, the message delivery overhead increases in OMN. For minimizing the overhead and maximizing the delivery rate, we propose two coalition-based cooperative schemes: 1) simple coalition formation (SCF) and 2) overlapping coalition formation (OCF) game. In SCF, we consider the presence of a central information center, whereas OCF is a fully distributed scheme. In SCF, coalitions are disjoint, whereas in OCF, a node may be the member of multiple coalitions at the same time. All nodes in a coalition help each other cooperatively by forwarding group messages to the intermediate or destination nodes. The goal of the nodes is to achieve high success rate in delivering messages. The proposed SCF scheme is cohesive, in which disjoint coalitions always combine to form grand coalition. In OCF, a node reaches a stable grand coalition when all the nodes of the OMN are members of overlapping coalition of the node. No node gains by deviating from the grand coalition in SCF and OCF. Simulation results based on synthetic mobility model and real-life traces show that the message delivery ratio of OMNs increase by up to 67%, as compared to the noncooperative scenario. Moreover, the message overhead ratio using the proposed coalition-based schemes reduces by up to about (1/3)rd of that of the noncooperative communication scheme.

  13. An Approach to Ad-hoc Messaging Networks Using Time Shifted Propagation

    Directory of Open Access Journals (Sweden)

    Christoph Fuchß

    2007-10-01

    Full Text Available Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET to the mechanism of the “fixed internet” to mobile networks. In order to achieve liability and robustness of common TCP connections routing algorithm in near field communication based networks become more sophisticated and complex. These mechanisms often do not reflect on the application’s particularities.Our approach of an ad-hoc messaging network (AMNET uses simple store-and-forward message passing to spread data asynchronously. We do not aim at the reliability of common internet networks but focus on application specific needs that can be covered by simple message passing mechanism. In this paper we will portray a powerful network by using simple devices and communication protocols on the basis of AMNETs. Simulation results of our AMNET approach provide insights towards speeding up the network setup process and to enable the use of AMNETs even with few participants by introducing a hybrid structure of infrastructure and mobile nodes.

  14. Data dissemination of emergency messages in mobile multi-sink wireless sensor networks

    NARCIS (Netherlands)

    Erman-Tüysüz, A.; Havinga, Paul J.M.

    In wireless sensor networks (WSNs), data dissemination is generally performed from sensor nodes to a static sink. If the data under consideration is an emergency message such as a fire alarm, it must be transmitted as fast and reliably as possible towards the sink of WSN. In such mission critical

  15. 76 FR 25695 - Public Health Information Network (PHIN) Messaging Guide for Syndromic Surveillance

    Science.gov (United States)

    2011-05-05

    .../library/2011/guides/Syndromic_Surveillance_Implementation_Guide_Release_1_4.pdf . Written comments... http://www.cdc.gov/phin/library/2011/guides/Syndromic_Surveillance_Implementation_Guide_Release_1_4.pdf...-2011-0004] Public Health Information Network (PHIN) Messaging Guide for Syndromic Surveillance AGENCY...

  16. A Pub/Sub Message Distribution Architecture for Disruption Tolerant Networks

    Science.gov (United States)

    Carrilho, Sergio; Esaki, Hiroshi

    Access to information is taken for granted in urban areas covered by a robust communication infrastructure. Nevertheless most of the areas in the world, are not covered by such infrastructures. We propose a DTN publish and subscribe system called Hikari, which uses nodes' mobility in order to distribute messages without using a robust infrastructure. The area of Disruption/Delay Tolerant Networks (DTN) focuses on providing connectivity to locations separated by networks with disruptions and delays. The Hikari system does not use node identifiers for message forwarding thus eliminating the complexity of routing associated with many forwarding schemes in DTN. Hikari uses nodes paths' information, advertised by special nodes in the system or predicted by the system itself, for optimizing the message dissemination process. We have used the Paris subway system, due to it's complexity, to validate Hikari and to analyze it's performance. We have shown that Hikari achieves a superior deliver rate while keeping redundant messages in the system low, which is ideal when using devices with limited resources for message dissemination.

  17. An Eco-Driving Advisory System for Continuous Signalized Intersections by Vehicular Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Wei-Hsun Lee

    2018-01-01

    Full Text Available With the vehicular ad hoc network (VANET technology which support vehicle-to-vehicle (V2V and vehicle to road side unit (V2R/R2V communications, vehicles can preview the intersection signal plan such as signal countdown message. In this paper, an ecodriving advisory system (EDAS is proposed to reduce CO2 emissions and energy consumption by letting the vehicle continuously pass through multiple intersections with the minimum possibilities of stops. We extend the isolated intersection model to multiple continuous intersections scenario. A hybrid method combining three strategies including maximized throughput model (MTM, smooth speed model (SSM, and minimized acceleration and deceleration (MinADM is designed, and it is compared with related works maximized throughput model (MaxTM, open traffic light control model (OTLCM, and predictive cruise control (PCC models. Some issues for the practical application including safe car following, queue clearing, and gliding mode are discussed and conquered. Simulation results show that the proposed model outperforms OTLCM 25.1%~81.2% in the isolated intersection scenario for the CO2 emissions and 20.5%~84.3% in averaged travel time. It also performs better than the compared PCC model in CO2 emissions (19.9%~31.2% as well as travel time (24.5%~35.9% in the multiple intersections scenario.

  18. Predicting behavior change from persuasive messages using neural representational similarity and social network analyses.

    Science.gov (United States)

    Pegors, Teresa K; Tompson, Steven; O'Donnell, Matthew Brook; Falk, Emily B

    2017-08-15

    Neural activity in medial prefrontal cortex (MPFC), identified as engaging in self-related processing, predicts later health behavior change. However, it is unknown to what extent individual differences in neural representation of content and lived experience influence this brain-behavior relationship. We examined whether the strength of content-specific representations during persuasive messaging relates to later behavior change, and whether these relationships change as a function of individuals' social network composition. In our study, smokers viewed anti-smoking messages while undergoing fMRI and we measured changes in their smoking behavior one month later. Using representational similarity analyses, we found that the degree to which message content (i.e. health, social, or valence information) was represented in a self-related processing MPFC region was associated with later smoking behavior, with increased representations of negatively valenced (risk) information corresponding to greater message-consistent behavior change. Furthermore, the relationship between representations and behavior change depended on social network composition: smokers who had proportionally fewer smokers in their network showed increases in smoking behavior when social or health content was strongly represented in MPFC, whereas message-consistent behavior (i.e., less smoking) was more likely for those with proportionally more smokers in their social network who represented social or health consequences more strongly. These results highlight the dynamic relationship between representations in MPFC and key outcomes such as health behavior change; a complete understanding of the role of MPFC in motivation and action should take into account individual differences in neural representation of stimulus attributes and social context variables such as social network composition. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Balancing emergency message dissemination and network lifetime in wireless body area network using ant colony optimization and Bayesian game formulation

    Directory of Open Access Journals (Sweden)

    R. Latha

    Full Text Available Nowadays, Wireless Body Area Network (WBAN is emerging very fast and so many new methods and algorithms are coming up for finding the optimal path for disseminating emergency messages. Ant Colony Optimization (ACO is one of the cultural algorithms for solving many hard problems such as Travelling Salesman Problem (TSP. ACO is a natural behaviour of ants, which work stochastically with the help of pheromone trails deposited in the shortest route to find their food. This optimization procedure involves adapting, positive feedback and inherent parallelism. Each ant will deposit certain amount of pheromone in the tour construction it makes searching for food. This type of communication is known as stigmetric communication. In addition, if a dense WBAN environment prevails, such as hospital, i.e. in the environment of overlapping WBAN, game formulation was introduced for analyzing the mixed strategy behaviour of WBAN. In this paper, the ant colony optimization approach to the travelling salesman problem was applied to the WBAN to determine the shortest route for sending emergency message to the doctor via sensor nodes; and also a static Bayesian game formulation with mixed strategy was analysed to enhance the network lifetime. Whenever the patient needs any critical care or any other medical issue arises, emergency messages will be created by the WBAN and sent to the doctor's destination. All the modes of communication were realized in a simulation environment using OMNet++. The authors investigated a balanced model of emergency message dissemination and network lifetime in WBAN using ACO and Bayesian game formulation. Keywords: Wireless body area network, Ant colony optimization, Bayesian game model, Sensor network, Message latency, Network lifetime

  20. Formation of a national network for rapid response to device and lead advisories: The Canadian Heart Rhythm Society Device Advisory Committee

    Science.gov (United States)

    Krahn, Andrew D; Simpson, Christopher S; Parkash, Ratika; Yee, Raymond; Champagne, Jean; Healey, Jeffrey S; Cameron, Doug; Thibault, Bernard; Mangat, Iqwal; Tung, Stanley; Sterns, Laurence; Birnie, David H; Exner, Derek V; Sivakumaran, Soori; Davies, Ted; Coutu, Benoit; Crystal, Eugene; Wolfe, Kevin; Verma, Atul; Stephenson, Elizabeth A; Sanatani, Shubhayan; Gow, Robert; Connors, Sean; Paredes, Felix Ayala; Turabian, Mike; Kus, Teresa; Essebag, Vidal; Gardner, Martin

    2009-01-01

    The Canadian Heart Rhythm Society (CHRS) Device Advisory Committee was commissioned to respond to advisories regarding cardiac rhythm device and lead performance on behalf of the CHRS. In the event of an advisory, the Chair uses an e-mail network to disseminate advisory information to Committee members broadly representative of the Canadian device community. A consensus recommendation is prepared by the Committee and made available to all Canadian centres on the CHRS Web site after approval by the CHRS executive. This collaborative approach using an e-mail network has proven very efficient in providing a rapid national response to device advisories. The network is an ideal tool to collect specific data on implanted device system performance and allows for prompt reporting of clinically relevant data to front-line clinicians and patients. PMID:19584969

  1. PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2016-01-01

    To enhance the performance of single intrusion detection systems (IDSs), collaborative intrusion detection networks (CIDNs) have been developed, which enable a set of IDS nodes to communicate with each other. In such a distributed network, insider attacks like collusion attacks are the main threat...... to advanced insider attacks in practical deployment. In this paper, we design a novel type of collusion attack, called passive message fingerprint attack (PMFA), which can collect messages and identify normal requests in a passive way. In the evaluation, we explore the attack performance under both simulated...... and real network environments. Experimental results indicate that under our attack, malicious nodes can send malicious responses to normal requests while maintaining their trust values....

  2. Minimizing Redundant Messages and Improving Search Efficiency under Highly Dynamic Mobile P2P Network

    Directory of Open Access Journals (Sweden)

    Ajay Arunachalam

    2016-02-01

    Full Text Available Resource Searching is one of the key functional tasks in large complex networks. With the P2P architecture, millions of peers connect together instantly building a communication pattern. Searching in mobile networks faces additional limitations and challenges. Flooding technique can cope up with the churn and searches aggressively by visiting almost all the nodes. But it exponentially increases the network traffic and thus does not scale well. Further the duplicated query messages consume extra battery power and network bandwidth. The blind flooding also suffers from long delay problem in P2P networks. In this paper, we propose optimal density based flooding resource discovery schemes. Our first model takes into account local graph topology information to supplement the resource discovery process while in our extended version we also consider the neighboring node topology information along with the local node information to further effectively use the mobile and network resources. Our proposed method reduces collision at the same time minimizes effect of redundant messages and failures. Overall the methods reduce network overhead, battery power consumption, query delay, routing load, MAC load and bandwidth usage while also achieving good success rate in comparison to the other techniques. We also perform a comprehensive analysis of the resource discovery schemes to verify the impact of varying node speed and different network conditions.

  3. The Impact of Message Replication on the Performance of Opportunistic Networks for Sensed Data Collection

    Directory of Open Access Journals (Sweden)

    Tekenate E. Amah

    2017-11-01

    Full Text Available Opportunistic networks (OppNets provide a scalable solution for collecting delay‑tolerant data from sensors for their respective gateways. Portable handheld user devices contribute significantly to the scalability of OppNets since their number increases according to user population and they closely follow human movement patterns. Hence, OppNets for sensed data collection are characterised by high node population and degrees of spatial locality inherent to user movement. We study the impact of these characteristics on the performance of existing OppNet message replication techniques. Our findings reveal that the existing replication techniques are not specifically designed to cope with these characteristics. This raises concerns regarding excessive message transmission overhead and throughput degradations due to resource constraints and technological limitations associated with portable handheld user devices. Based on concepts derived from the study, we suggest design guidelines to augment existing message replication techniques. We also follow our design guidelines to propose a message replication technique, namely Locality Aware Replication (LARep. Simulation results show that LARep achieves better network performance under high node population and degrees of spatial locality as compared with existing techniques.

  4. Use of Social Network Sites and Instant Messaging Does Not Lead to Increased Offline Social Network Size, or to Emotionally Closer Relationships with Offline Network Members

    NARCIS (Netherlands)

    Pollet, Thomas V.; Roberts, Sam G. B.; Dunbar, Robin I. M.

    The effect of Internet use on social relationships is still a matter of intense debate. This study examined the relationships between use of social media (instant messaging and social network sites), network size, and emotional closeness in a sample of 117 individuals aged 18 to 63 years old. Time

  5. End-to-End Delay Model for Train Messaging over Public Land Mobile Networks

    Directory of Open Access Journals (Sweden)

    Franco Mazzenga

    2017-11-01

    Full Text Available Modern train control systems rely on a dedicated radio network for train to ground communications. A number of possible alternatives have been analysed to adopt the European Rail Traffic Management System/European Train Control System (ERTMS/ETCS control system on local/regional lines to improve transport capacity. Among them, a communication system based on public networks (cellular&satellite provides an interesting, effective and alternative solution to proprietary and expensive radio networks. To analyse performance of this solution, it is necessary to model the end-to-end delay and message loss to fully characterize the message transfer process from train to ground and vice versa. Starting from the results of a railway test campaign over a 300 km railway line for a cumulative 12,000 traveled km in 21 days, in this paper, we derive a statistical model for the end-to-end delay required for delivering messages. In particular, we propose a two states model allowing for reproducing the main behavioral characteristics of the end-to-end delay as observed experimentally. Model formulation has been derived after deep analysis of the recorded experimental data. When it is applied to model a realistic scenario, it allows for explicitly accounting for radio coverage characteristics, the received power level, the handover points along the line and for the serving radio technology. As an example, the proposed model is used to generate the end-to-end delay profile in a realistic scenario.

  6. Novel store–carry–forward scheme for message dissemination in vehicular ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Truc D.T. Nguyen

    2017-12-01

    Full Text Available To improve traffic safety in intelligent transportation systems, vehicles formed by vehicular ad-hoc networks (VANETs conventionally disseminate warning messages to their nearby vehicles as soon as a dangerous situation occurs. In this paper, we propose a novel scheme employing a novel story–carry–forward (SCF mechanism to tackle the network partition and broadcast storm problems, which are two major challenges in VANETs. The experimental result in the Veins simulation framework shows that the proposed SCF scheme significantly mitigates broadcast storms relative to other schemes, and maintains good coverage across various traffic densities.

  7. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  8. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  9. Delay/Disruption Tolerant Network-Based Message Forwarding for a River Pollution Monitoring Wireless Sensor Network Application.

    Science.gov (United States)

    Velásquez-Villada, Carlos; Donoso, Yezid

    2016-03-25

    Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river's course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas' movement and network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time applications, we propose a Delay/Disruption Tolerant Network (DTN)-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols.

  10. Delay/Disruption Tolerant Network-Based Message Forwarding for a River Pollution Monitoring Wireless Sensor Network Application

    Directory of Open Access Journals (Sweden)

    Carlos Velásquez-Villada

    2016-03-01

    Full Text Available Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river’s course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas’ movement and network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time applications, we propose a Delay/Disruption Tolerant Network (DTN-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols.

  11. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Directory of Open Access Journals (Sweden)

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  12. Use of social network sites and instant messaging does not lead to increased offline social network size, or to emotionally closer relationships with offline network members.

    Science.gov (United States)

    Pollet, Thomas V; Roberts, Sam G B; Dunbar, Robin I M

    2011-04-01

    The effect of Internet use on social relationships is still a matter of intense debate. This study examined the relationships between use of social media (instant messaging and social network sites), network size, and emotional closeness in a sample of 117 individuals aged 18 to 63 years old. Time spent using social media was associated with a larger number of online social network "friends." However, time spent using social media was not associated with larger offline networks, or feeling emotionally closer to offline network members. Further, those that used social media, as compared to non-users of social media, did not have larger offline networks, and were not emotionally closer to offline network members. These results highlight the importance of considering potential time and cognitive constraints on offline social networks when examining the impact of social media use on social relationships.

  13. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    LENUS (Irish Health Repository)

    Nicholson, Emma

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users.

  14. Readiness of the Defense Message System to Replace the Automatic Digital Network

    National Research Council Canada - National Science Library

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  15. The persuasion network is modulated by drug-use risk and predicts anti-drug message effectiveness

    Science.gov (United States)

    Mangus, J Michael; Turner, Benjamin O

    2017-01-01

    Abstract While a persuasion network has been proposed, little is known about how network connections between brain regions contribute to attitude change. Two possible mechanisms have been advanced. One hypothesis predicts that attitude change results from increased connectivity between structures implicated in affective and executive processing in response to increases in argument strength. A second functional perspective suggests that highly arousing messages reduce connectivity between structures implicated in the encoding of sensory information, which disrupts message processing and thereby inhibits attitude change. However, persuasion is a multi-determined construct that results from both message features and audience characteristics. Therefore, persuasive messages should lead to specific functional connectivity patterns among a priori defined structures within the persuasion network. The present study exposed 28 subjects to anti-drug public service announcements where arousal, argument strength, and subject drug-use risk were systematically varied. Psychophysiological interaction analyses provide support for the affective-executive hypothesis but not for the encoding-disruption hypothesis. Secondary analyses show that video-level connectivity patterns among structures within the persuasion network predict audience responses in independent samples (one college-aged, one nationally representative). We propose that persuasion neuroscience research is best advanced by considering network-level effects while accounting for interactions between message features and target audience characteristics. PMID:29140500

  16. The persuasion network is modulated by drug-use risk and predicts anti-drug message effectiveness.

    Science.gov (United States)

    Huskey, Richard; Mangus, J Michael; Turner, Benjamin O; Weber, René

    2017-12-01

    While a persuasion network has been proposed, little is known about how network connections between brain regions contribute to attitude change. Two possible mechanisms have been advanced. One hypothesis predicts that attitude change results from increased connectivity between structures implicated in affective and executive processing in response to increases in argument strength. A second functional perspective suggests that highly arousing messages reduce connectivity between structures implicated in the encoding of sensory information, which disrupts message processing and thereby inhibits attitude change. However, persuasion is a multi-determined construct that results from both message features and audience characteristics. Therefore, persuasive messages should lead to specific functional connectivity patterns among a priori defined structures within the persuasion network. The present study exposed 28 subjects to anti-drug public service announcements where arousal, argument strength, and subject drug-use risk were systematically varied. Psychophysiological interaction analyses provide support for the affective-executive hypothesis but not for the encoding-disruption hypothesis. Secondary analyses show that video-level connectivity patterns among structures within the persuasion network predict audience responses in independent samples (one college-aged, one nationally representative). We propose that persuasion neuroscience research is best advanced by considering network-level effects while accounting for interactions between message features and target audience characteristics. © The Author (2017). Published by Oxford University Press.

  17. NCC simulation model. Phase 2: Simulating the operations of the Network Control Center and NCC message manual

    Science.gov (United States)

    Benjamin, Norman M.; Gill, Tepper; Charles, Mary

    1994-01-01

    The network control center (NCC) provides scheduling, monitoring, and control of services to the NASA space network. The space network provides tracking and data acquisition services to many low-earth orbiting spacecraft. This report describes the second phase in the development of simulation models for the FCC. Phase one concentrated on the computer systems and interconnecting network.Phase two focuses on the implementation of the network message dialogs and the resources controlled by the NCC. Performance measures were developed along with selected indicators of the NCC's operational effectiveness.The NCC performance indicators were defined in terms of the following: (1) transfer rate, (2) network delay, (3) channel establishment time, (4) line turn around time, (5) availability, (6) reliability, (7) accuracy, (8) maintainability, and (9) security. An NCC internal and external message manual is appended to this report.

  18. Report on the IAEA advisory group meeting on network of nuclear reaction data centres

    Energy Technology Data Exchange (ETDEWEB)

    Pronyaev, V G; Schwerer, O [International Atomic Energy Agency, Nuclear Data Section, Vienna (Austria)

    2000-08-01

    This report summarizes the IAEA Advisory Group Meeting (AGM) on Network of Nuclear Reaction Data Centres, hold at the Institute of Physics and Power Engineering, Obninsk, Russia, 15 to 19 May 2000. The meeting was attended by 28 participants from 13 co-operating data centres from seven Member States and two International Organizations. The report contains a meeting summary, the conclusions and actions, progress and status reports of the participating data centres and working papers considered at the meeting. (author)

  19. Design of a Message Passing Model for Use in a Heterogeneous CPU-NFP Framework for Network Analytics

    CSIR Research Space (South Africa)

    Pennefather, S

    2017-09-01

    Full Text Available of applications written in the Go programming language to be executed on a Network Flow Processor (NFP) for enhanced performance. This paper explores the need and feasibility of implementing a message passing model for data transmission between the NFP and CPU...

  20. The persuasion network is modulated by drug-use risk and predicts anti-drug message effectiveness

    OpenAIRE

    Huskey, Richard; Mangus, J Michael; Turner, Benjamin O; Weber, René

    2017-01-01

    Abstract While a persuasion network has been proposed, little is known about how network connections between brain regions contribute to attitude change. Two possible mechanisms have been advanced. One hypothesis predicts that attitude change results from increased connectivity between structures implicated in affective and executive processing in response to increases in argument strength. A second functional perspective suggests that highly arousing messages reduce connectivity between stru...

  1. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    Science.gov (United States)

    Gokulakrishnan, P; Ganeshkumar, P

    2015-01-01

    A Road Accident Prevention (RAP) scheme based on Vehicular Backbone Network (VBN) structure is proposed in this paper for Vehicular Ad-hoc Network (VANET). The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident) is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i) the Road Side Unit (RSU) constructs a Prediction Report (PR) based on the status of the vehicles and traffic in the highway roads, (ii) the RSU generates an Emergency Warning Message (EWM) based on an abnormal PR, (iii) the RSU forms a VBN structure and (iv) the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF) and travels in High Risk Zone (HRZ). These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure). The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs) by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  2. Managing healthcare information using short message service (SMS) in wireless broadband networks

    Science.gov (United States)

    Documet, Jorge; Tsao, Sinchai; Documet, Luis; Liu, Brent J.; Zhou, Zheng; Joseph, Anika O.

    2007-03-01

    Due to the ubiquity of cell phones, SMS (Short Message Service) has become an ideal means to wirelessly manage a Healthcare environment and in particular PACS (Picture Archival and Communications System) data. SMS is a flexible and mobile method for real-time access and control of Healthcare information systems such as HIS (Hospital Information System) or PACS. Unlike conventional wireless access methods, SMS' mobility is not limited by the presence of a WiFi network or any other localized signal. It provides a simple, reliable yet flexible method to communicate with an information system. In addition, SMS services are widely available for low costs from cellular phone service providers and allows for more mobility than other services such as wireless internet. This paper aims to describe a use case of SMS as a means of remotely communicating with a PACS server. Remote access to a PACS server and its Query-Retrieve services allows for a more convenient, flexible and streamlined radiology workflow. Wireless access methods such as SMS will increase dedicated PACS workstation availability for more specialized DICOM (Digital Imaging and Communications in Medicine) workflow management. This implementation will address potential security, performance and cost issues of applying SMS as part of a healthcare information management system. This is in an effort to design a wireless communication system with optimal mobility and flexibility at minimum material and time costs.

  3. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    Directory of Open Access Journals (Sweden)

    P Gokulakrishnan

    Full Text Available A Road Accident Prevention (RAP scheme based on Vehicular Backbone Network (VBN structure is proposed in this paper for Vehicular Ad-hoc Network (VANET. The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i the Road Side Unit (RSU constructs a Prediction Report (PR based on the status of the vehicles and traffic in the highway roads, (ii the RSU generates an Emergency Warning Message (EWM based on an abnormal PR, (iii the RSU forms a VBN structure and (iv the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF and travels in High Risk Zone (HRZ. These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure. The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  4. Permanent Advisory Network for Diseases in Aquaculture (PANDA)

    OpenAIRE

    Arzul, Isabelle; Ariel, E.; Hill, B.

    2005-01-01

    The PANDA project aims to establish a permanent network of aquatic animal health specialists (researchers and diagnosticians) to provide a forum for the debate of issues concerning diseases in European aquaculture, and to communicate the results of these discussions to the European Commission with provision of advice on EU policy and legislation for aquatic animal health. PANDA consists of five scientific work packages: risk analysis, epidemiology, diagnosis, environmentally safe strategies f...

  5. A Collaboration-Oriented M2M Messaging Mechanism for the Collaborative Automation between Machines in Future Industrial Networks

    Directory of Open Access Journals (Sweden)

    Zhaozong Meng

    2017-11-01

    Full Text Available Machine-to-machine (M2M communication is a key enabling technology for industrial internet of things (IIoT-empowered industrial networks, where machines communicate with one another for collaborative automation and intelligent optimisation. This new industrial computing paradigm features high-quality connectivity, ubiquitous messaging, and interoperable interactions between machines. However, manufacturing IIoT applications have specificities that distinguish them from many other internet of things (IoT scenarios in machine communications. By highlighting the key requirements and the major technical gaps of M2M in industrial applications, this article describes a collaboration-oriented M2M (CoM2M messaging mechanism focusing on flexible connectivity and discovery, ubiquitous messaging, and semantic interoperability that are well suited for the production line-scale interoperability of manufacturing applications. The designs toward machine collaboration and data interoperability at both the communication and semantic level are presented. Then, the application scenarios of the presented methods are illustrated with a proof-of-concept implementation in the PicknPack food packaging line. Eventually, the advantages and some potential issues are discussed based on the PicknPack practice.

  6. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Directory of Open Access Journals (Sweden)

    Sumithra Alagarsamy

    Full Text Available Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff Equation using an Integration Factor (DiffEIF, minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  7. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Science.gov (United States)

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  8. Extending IM beyond the Reference Desk: A Case Study on the Integration of Chat Reference and Library-Wide Instant Messaging Network

    Directory of Open Access Journals (Sweden)

    Ian Chan

    2012-09-01

    Full Text Available Openfire is an open source IM network and a single unified application that meets the needs of chat reference and internal communications. In Fall 2009, the California State University San Marcos (CSUSM Library began use of Openfire and other Jive software instant messaging technologies, to simultaneously improve our existing IM-integrated chat reference software and implement an internal IM network. This case study describes the chat reference and internal communications environment at the CSUSM Library and the selection, implementation, and evaluation of Openfire. In addition, the authors discuss the benefits of deploying an integrated instant messaging and chat reference network.

  9. Fencing network direct memory access data transfers in a parallel active messaging interface of a parallel computer

    Science.gov (United States)

    Blocksome, Michael A.; Mamidala, Amith R.

    2015-07-07

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to a deterministic data communications network through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and the deterministic data communications network; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  10. Unified Internet Messaging

    OpenAIRE

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  11. Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip

    NARCIS (Netherlands)

    Hansson, A.; Goossens, K.; Rãdulescu, A.

    2007-01-01

    Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions

  12. Geoscience communication in Namibia: YES Network Namibia spreading the message to young scientists

    Science.gov (United States)

    Mhopjeni, Kombada

    2015-04-01

    The Young Earth Scientists (YES) Network is an international association for early-career geoscientists under the age of 35 years that was formed as a result of the International Year of Planet Earth (IYPE) in 2007. YES Network aims to establish an interdisciplinary global network of early-career geoscientists to solve societal issues/challenges using geosciences, promote scientific research and interdisciplinary networking, and support professional development of early-career geoscientists. The Network has several National Chapters including one in Namibia. YES Network Namibia (YNN) was formed in 2009, at the closing ceremony of IYPE in Portugal and YNN was consolidated in 2013 with the current set-up. YNN supports the activities and goals of the main YES Network at national level providing a platform for young Namibian scientists with a passion to network, information on geoscience opportunities and promoting earth sciences. Currently most of the members are geoscientists from the Geological Survey of Namibia (GSN) and University of Namibia. In 2015, YNN plans to carry out two workshops on career guidance, establish a mentorship program involving alumni and experienced industry experts, and increase involvement in outreach activities, mainly targeting high school pupils. Network members will participate in a range of educational activities such as school career and science fairs communicating geoscience to the general public, learners and students. The community outreach programmes are carried out to increase awareness of the role geosciences play in society. In addition, YNN will continue to promote interactive collaboration between the University of Namibia, Geological Survey of Namibia (GSN) and Geological Society of Namibia. Despite the numerous potential opportunities YNN offers young scientists in Namibia and its presence on all major social media platforms, the Network faces several challenges. One notable challenge the Network faces is indifference among

  13. Seeding on Moving Ground: How Understanding Network Instability Can Improve Message Dissemination

    Directory of Open Access Journals (Sweden)

    Muchnik Lev

    2017-11-01

    Full Text Available Most analyses of the social structure of a network implicitly assume that the relationships in the network are relatively stable. We present evidence that this is not the case. The focal network of this study grew in bursts rather than monotonously over time, and the bursts were highly localized. Links were added and deleted in nearby localities and are not randomly dispersed throughout the network. Also changes in structure lead to simultaneous changes in self-stated interests of its members. For SNA marketing applications the findings suggest interesting improvements. Local bursts around a seed can change the structure of the network dramatically and therefore a marketer’s influence and his chances of success. Therefore, network measurements should be carried out more frequently and closer to the actual implementation of a seeding campaign. To detect these abrupt, dramatic local changes marketers also use a finer resolution. Further, recommendation algorithms that simultaneously account for changes in network structure and content should be applied.

  14. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Science.gov (United States)

    2013-06-10

    ... Committee (HSINAC); Meeting AGENCY: OPS/OCIO, DHS. ACTION: Committee Management; Notice of Federal Advisory... matters include system requirements, operating policies, community organization, knowledge management... would like to request advice and recommendations on the user experience regarding the identity proofing...

  15. Beyond fragmentation and disconnect: networks for knowledge sharing in the English land management advisory system

    NARCIS (Netherlands)

    Klerkx, L.W.A.; Proctor, A.

    2012-01-01

    The growing multifunctionality in agriculture, combined with privatisation of previously state-funded agricultural extension services, has resulted in a pluralistic land management advisory system. Despite benefits in terms of increased client orientation and greater advisor diversity, it is argued

  16. Farmers’ Preferences for Mobile Agro Advisory Services

    Directory of Open Access Journals (Sweden)

    Duraisamy Prabha

    2017-12-01

    Full Text Available This study was conducted in Coimbatore district of Tamil Nadu to understand the service preferences of the mobile agro advisory services offered by the public extension system. The agro advisories offered by the e-extension centre of Tamil Nadu Agricultural University were selected for the study. A sample of 200 respondents was selected employing proportionate random sampling method. The study was carried out in terms of dimensions viz., technical components, message frequency and timings, message physical dimension, message channel and message follow up. Results of the survey showed that among the technical components majority of the respondents opined that the information on advance warning of weather risks was very much adequate, the messages on plant protection were relevant and that the messages on advance warning of weather risks were timely. With reference to the message frequency, a majority preferred frequency of the messages on daily basis and preferred to receive messages during mornings.

  17. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  18. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  19. Distributed parallel messaging for multiprocessor systems

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  20. Moving forward on strengthening and sustaining National Immunization Technical Advisory Groups (NITAGs) globally: Recommendations from the 2nd global NITAG network meeting.

    Science.gov (United States)

    MacDonald, Noni E; Duclos, Philippe; Wichmann, Ole; Henaff, Louise; Harnden, Anthony; Alshammary, Aisha; Tijerino, Roberto Arroba; Hall, Madeline; Sacarlal, Jahit; Singh, Rupa Rajbhandari

    2017-12-15

    National Immunization Technical Advisory Groups (NITAGs) provide independent, evidence-informed advice to assist their governments in immunization policy formation. This is complex work and many NITAGs face challenges in fulfilling their roles. Inter-country NITAG collaboration opportunities have the potential to enhance NITAG function and grow the quality of recommendations. Hence the many requests for formation of a network linking NITAGs together so they can learn from each other. The first Global NITAG Network (GNN) meeting, held in 2016, led to a push to launch the GNN and grow the network. At the second GNN meeting, held June 28-29, 2017 in Berlin, the GNN was formally inaugurated. Participants discussed GNN governance, reflected on the April 2017 Strategic Advisory Group of Experts (SAGE) on Immunization conclusions concerning strengthening of NITAGs and also shared NITAG experiences in evaluation and inter-country collaborations and independence. They also discussed the role of Regional Technical Advisory Groups on Immunization (RTAGs) and regional networks. A number of issues were raised including NITAGs and communications, dissemination of recommendations and vaccine implementation as well as implications of off-label recommendations. Participants were alerted to immunization evidence assessment sites and value of sharing of resources. They also discussed potential GNN funding opportunities, developed an action plan for 2017-18 and selected a Steering Committee to help move the GNN forward. All participants agreed on the importance of the GNN and the value in attracting more countries to join the GNN. Copyright © 2017.

  1. The persuasion context and results in online opinion seeking: effects of message and source-the moderating role of network managers.

    Science.gov (United States)

    Cabezudo, Rebeca San José; Izquierdo, Carmen Camarero; Pinto, Javier Rodríguez

    2013-11-01

    Online opinion networks are areas for social exchange, or conversational networks, made up of individuals actively involved in sharing experiences and opinions concerning matters of mutual interest between consumers or concerning their experience with a given product or service. We pinpoint a gap in the literature regarding how the persuasion process occurs when individuals seek opinions online, including the results process. In an attempt to find an answer, we draw on traditional theories related to information processing. These are mostly taken from the field of psychology and enable us to identify which signals or aspects of communication or opinions the individuals focus their attention on (message and source) and the value attached to such communications as well as how much they impact individuals' purchase decisions, bearing in mind the medium (or online opinion network) in which the opinions are located. Findings from those interviewed support the idea that the quality of information on the Internet, as well as trust in the source of said information, or in the opinion of network users, have an impact on the informational value obtained from involvement in this online opinion seeking and on purchasing decisions. Moreover, depending on the kind of network (firm or brand controlled, review Web sites, and user-controlled nonofficial opinion networks), the quality of the information or trust in the users will have a different bearing in the persuasion process.

  2. What makes it likeable? A study on the reactions to messages in a digital social network: the case of Facebook in Farsi.

    Science.gov (United States)

    Sabbar, Shaho; Hyun, Daiwon

    2016-01-01

    After a piece of information is put into a network, its fate depends on the behaviors of the nodes of the network; nodes that are equipped with the hardware and software of the age of information and are more powerful than any time in the past. This study suggests that a useful research for communication, marketing and advertising would be one that looks for patterns in the reactions of the nodes toward different pieces of information. This study has used Facebook to see how people have reacted to different types of messages in terms of liking, sharing and commenting. Rather than looking for universal, generalizable patterns we have tried to examine the practicality of the proposed method. The practical aspect of the study comes after a short theoretical discussion on the issue of flow of information in a digital world. The results revealed dozens of significant relations between the examined variables. This study, its theoretical discussion and results suggest that it would be practical to study the relations between the characteristics of Facebook messages and the type of reactions (liking, sharing and commenting) that they attract.

  3. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  4. Advanced Messaging Concept Development Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  5. DMS message design workshops.

    Science.gov (United States)

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  6. Deployment and Field Evaluation of In-Vehicle Traffic Signal Advisory System (ITSAS

    Directory of Open Access Journals (Sweden)

    Joyoung Lee

    2017-06-01

    Full Text Available This research evaluates the impact of In-vehicle Signal Advisory System (ITSAS on signalized arterial. ITSAS provides individual drivers equipped with a mobile communication device with advisory speed information enabling to minimize the time delay and fuel consumption when crossing intersection. Given the instantaneous vehicular driving information, such as position, speed, and acceleration rate, ITSAS produces advisory speed information by taking into consideration the traffic signal changes at a downstream intersection. The advisory speed information includes not only an optimal speed range updated every 300-ft for individual drivers but also a descriptive message to warn drivers stop to ensure safety at the downstream intersection. Unlike other similar Connected Vehicles applications for intersection management, ITSAS does not require Roadside Equipment (RSE to disseminate the advisory speed information as it is designed to exploit commercial cellular network service (i.e., 3G and 4G-LTE. Thus, ITSAS can be easily plugged into existing traffic control management system to rapidly conduct its implementation without significant additional cost. This research presents the field evaluations of ITSAS on a signalized corridor in New Jersey, which discovered significant travel time savings for the equipped vehicle.

  7. Innovation networks to stimulate public and private sector collaboration for advisory services innovation and coordination

    NARCIS (Netherlands)

    Rijswijk, K.; Brazendale, R.

    2017-01-01

    Purpose: An innovation network, called the Pasture Improvement Leadership Group (PILG), was formed to improve the quality and consistency of advice provided to dairy farmers in New Zealand, after they expressed dissatisfaction with their pastures. The aim of this paper is to better understand the

  8. Towards the Engineering of Dependable P2P-Based Network Control — The Case of Timely Routing Control Messages

    Science.gov (United States)

    Tutschku, Kurt; Nakao, Akihiro

    This paper introduces a methodology for engineering best-effort P2P algorithms into dependable P2P-based network control mechanism. The proposed method is built upon an iterative approach consisting of improving the original P2P algorithm by appropriate mechanisms and of thorough performance assessment with respect to dependability measures. The potential of the methodology is outlined by the example of timely routing control for vertical handover in B3G wireless networks. In detail, the well-known Pastry and CAN algorithms are enhanced to include locality. By showing how to combine algorithmic enhancements with performance indicators, this case study paves the way for future engineering of dependable network control mechanisms through P2P algorithms.

  9. Information and Communications Technologies (ICT): Problematic use of Internet, video games, mobile phones, instant messaging and social networks using MULTICAGE-TIC.

    Science.gov (United States)

    Pedrero Pérez, Eduardo J; Ruiz Sánchez de León, José María; Rojo Mota, Gloria; Llanero Luque, Marcos; Pedrero Aguilar, Jara; Morales Alonso, Sara; Puerta García, Carmen

    2018-01-01

    Use/abuse of Information and Communications Technologies (ICT) has in recent years become a topic of great interest. Current discussion addresses whether it must be considered addictive behaviour and if it is a problem that primarily affects adolescents and youth. This study aims to understand the problems that affect people of all ages in controlling the use of these ICTs and whether they are related to mental health problems, stress and difficulties in executive control of behaviour. A survey was administered through social networks and email, using the MULTICAGE-ICT, a questionnaire that explores problems in the use of Internet, mobile phones, video games, instant messaging and social networks. Additionally, the Prefrontal Symptom Inventory, General Health Questionnaire and Perceived Stress Scale were administered. The sample was comprised of 1,276 individuals of all ages from different Spanish-speaking countries. The results indicate that about 50% of the sample, regardless of age or other variables, presents significant problems with the use of these technologies, and that these problems are directly related to symptoms of poor prefrontal functioning, stress and mental health problems. The results reveal the need for reconsidering whether we are facing an addictive behaviour or a new problem demanding environmental, psychological, sociological and sociopolitical explanations; therefore, it is necessary to reformulate actions to be implemented to address and refocus our understanding of the problem.

  10. Representing Social Network and Research Diversity of Library and Information Science in Taiwan Using Thesis Advisory Network

    Directory of Open Access Journals (Sweden)

    董采維 Tsai-Wei Tung

    2014-10-01

    Full Text Available Drawing from thesis committee membership data, the study took a social analytical approach toanalyze the social and intellectual structure of the field of LIS (Library and Information Science inTaiwan. Specifically, the study attempt to study: firstly, the faculty collaboration network; andsecondly, the degree and nature of inter-disciplinary collaboration, as reflected in the compositionof the thesis committees. A total 751 Master’s theses published by the eight LIS in the periodsfrom 2006 to 2011 were analyzed. Data extracted included the composition of each committeemember-ship and research topics covered in these theses. Furthermore, data about the faculty’sbackground were also collected, including gender, seniority, department affiliation, highest degreereceived, with which the faculty’s degree of interdisciplinary collaboration, as reflected in the thesiscommittee they appeared, could be analyzed. With the theses committee composition data, networksof faculty collaboration were generated where each faulty member were represented by a node,and the strength of their collaboration was represented by the frequency of their co-appeared inthese committees. Various network measures, such as centrality, clustering coefficient, E-I indexwere used to study the cohesion of each department and the LIS filed as a whole. Three diversitymeasures: Shannon, Simpson, and Gini coefficient, were used to assess the degree of interdisciplinarityof each department and faculty. Regression analyses showed that the number of these advised,seniority, and thesis topic diversity were the significant predictor of a faculty’s centrality in the LISnetwork.

  11. Mixed messages

    Science.gov (United States)

    Chen, Christopher B.; Hall, Kevin; Tsuyuki, Ross T.

    2014-01-01

    Background: More than 5 years ago, the Blueprint for Pharmacy developed a plan for transitioning pharmacy practice toward more patient-centred care. Much of the strategy for change involves communicating the new vision. Objective: To evaluate the communication of the Vision for Pharmacy by the organizations and corporations that signed the Blueprint for Pharmacy’s Commitment to Act. Methods: The list of 88 signatories of the Commitment to Act was obtained from the Blueprint for Pharmacy document. The website of each of these signatories was searched for all references to the Blueprint for Pharmacy or Vision for Pharmacy. Each of the identified references was then analyzed using summative content analysis. Results: A total of 934 references were identified from the webpages of the 88 signatories. Of these references, 549 were merely links to the Blueprint for Pharmacy’s website, 350 of the references provided some detailed information about the Blueprint for Pharmacy and only 35 references provided any specific plans to transition pharmacy practice. Conclusion: Widespread proliferation of the Vision for Pharmacy has not been achieved. One possible explanation for this is that communication of the vision by the signatories has been incomplete. To ensure the success of future communications, change leaders must develop strategies that consider how individual pharmacists and pharmacies understand the message. PMID:24660012

  12. The Puerto Rico Seismic Network Broadcast System: A user friendly GUI to broadcast earthquake messages, to generate shakemaps and to update catalogues

    Science.gov (United States)

    Velez, J.; Huerfano, V.; von Hillebrandt, C.

    2007-12-01

    The Puerto Rico Seismic Network (PRSN) has historically provided locations and magnitudes for earthquakes in the Puerto Rico and Virgin Islands (PRVI) region. PRSN is the reporting authority for the region bounded by latitudes 17.0N to 20.0N, and longitudes 63.5W to 69.0W. The main objective of the PRSN is to record, process, analyze, provide information and research local, regional and teleseismic earthquakes, providing high quality data and information to be able to respond to the needs of the emergency management, academic and research communities, and the general public. The PRSN runs Earthworm software (Johnson et al, 1995) to acquire and write waveforms to disk for permanent archival. Automatic locations and alerts are generated for events in Puerto Rico, the Intra America Seas, and the Atlantic by the EarlyBird system (Whitmore and Sokolowski, 2002), which monitors PRSN stations as well as some 40 additional stations run by networks operating in North, Central and South America and other sites in the Caribbean. PRDANIS (Puerto Rico Data Analysis and Information System) software, developed by PRSN, supports manual locations and analyst review of automatic locations of events within the PRSN area of responsibility (AOR), using all the broadband, strong-motion and short-period waveforms Rapidly available information regarding the geographic distribution of ground shaking in relation to the population and infrastructure at risk can assist emergency response communities in efficient and optimized allocation of resources following a large earthquake. The ShakeMap system developed by the USGS provides near real-time maps of instrumental ground motions and shaking intensity and has proven effective in rapid assessment of the extent of shaking and potential damage after significant earthquakes (Wald, 2004). In Northern and Southern California, the Pacific Northwest, and the states of Utah and Nevada, ShakeMaps are used for emergency planning and response, loss

  13. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2012-01-01

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  14. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  15. EMI Messaging Guidelines

    CERN Document Server

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  16. Strengthening and sustainability of national immunization technical advisory groups (NITAGs) globally: Lessons and recommendations from the founding meeting of the global NITAG network.

    Science.gov (United States)

    Adjagba, Alex; MacDonald, Noni E; Ortega-Pérez, Inmaculada; Duclos, Philippe

    2017-05-25

    National Immunization Technical Advisory Groups (NITAGs) provide independent, evidence-informed advice to assist their governments in immunization policy formation. However, many NITAGs face challenges in fulfilling their roles. Hence the many requests for formation of a network linking NITAGs together so they can learn from each other. To address this request, the Health Policy and Institutional Development (HPID) Center (a WHO Collaborating Center at the Agence de Médecine Préventive - AMP), in collaboration with WHO, organized a meeting in Veyrier-du-Lac, France, on 11 and 12 May 2016, to establish a Global NITAG Network (GNN). The meeting focused on two areas: the requirements for (a) the establishment of a global NITAG collaborative network; and (b) the global assessment/evaluation of the performance of NITAGs. 35 participants from 26 countries reviewed the proposed GNN framework documents and NITAG performance evaluation. Participants recommended that a GNN should be established, agreed on its governance, function, scope and a proposed work plan as well as setting a framework for NITAG evaluation. Copyright © 2017.

  17. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-04-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require and application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI 'C' and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  18. Factors influencing message dissemination through social media

    Science.gov (United States)

    Zheng, Zeyu; Yang, Huancheng; Fu, Yang; Fu, Dianzheng; Podobnik, Boris; Stanley, H. Eugene

    2018-06-01

    Online social networks strongly impact our daily lives. An internet user (a "Netizen") wants messages to be efficiently disseminated. The susceptible-infected-recovered (SIR) dissemination model is the traditional tool for exploring the spreading mechanism of information diffusion. We here test our SIR-based dissemination model on open and real-world data collected from Twitter. We locate and identify phase transitions in the message dissemination process. We find that message content is a stronger factor than the popularity of the sender. We also find that the probability that a message will be forwarded has a threshold that affects its ability to spread, and when the probability is above the threshold the message quickly achieves mass dissemination.

  19. Message Passing Framework for Globally Interconnected Clusters

    International Nuclear Information System (INIS)

    Hafeez, M; Riaz, N; Asghar, S; Malik, U A; Rehman, A

    2011-01-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  20. IAEA advisory group meeting on technical aspects of atomic and molecular data processing and exchange (15. meeting of the A+M data centres and ALADDIN network). Summary report

    International Nuclear Information System (INIS)

    Stephens, J.A.

    1999-12-01

    The proceedings of the IAEA Advisory Group Meeting on 'Technical Aspects of Atomic and Molecular Data Processing and Exchange' (15th Meeting of A+M Data Centres and ALADDIN Network), held on September 13-14, 1999 in Vienna, Austria are briefly described. The meeting conclusions and recommendations on the priorities in A+M data compilation and evaluation, and on the technical aspects of data processing, exchange, and distribution are also presented. (author)

  1. IAEA advisory group meeting on 'Technical Aspects of Atomic and Molecular Data Processing and Exchange' (14th meeting of the A + M data centres and ALADDIN network). Summary report

    International Nuclear Information System (INIS)

    Stephens, A.

    1998-01-01

    The proceedings of the IAEA Advisory Group Meeting on ''Technical Aspects of Atomic and Molecular Data Processing and Exchange (14th Meeting of A + M Data Centres and ALADDIN Network)'', held on July 21-22, 1997 in Vienna, Austria are briefly described. The meeting conclusions and recommendations on the priorities in A + M data compilation and evaluation, and on the technical aspects of data processing and exchange are also presented. The document includes 15 reports from various Data Centres

  2. IAEA advisory group meeting on technical aspects of atomic and molecular data processing and exchange (16. meeting of the A+M Data Centres and ALADDIN network). Summary report

    Energy Technology Data Exchange (ETDEWEB)

    Stephens, J A [ed.

    2001-12-01

    The proceedings of the IAEA Advisory group meeting on technical aspects of atomic and molecular data processing and exchange (16. meeting of A+M Data centers and ALADDIN Network), held on September 10-11, 2001 in Vienna, Austria are briefly described. The meeting conclusions and recommendations on the priorities in A+M data compilation and evaluation, and on the technical aspects of data processing, exchange and distribution are also presented. (author)

  3. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  4. Instant Messaging in Dental Education.

    Science.gov (United States)

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  5. Diffusion of Messages from an Electronic Cigarette Brand to Potential Users through Twitter.

    Directory of Open Access Journals (Sweden)

    Kar-Hai Chu

    Full Text Available This study explores the presence and actions of an electronic cigarette (e-cigarette brand, Blu, on Twitter to observe how marketing messages are sent and diffused through the retweet (i.e., message forwarding functionality. Retweet networks enable messages to reach additional Twitter users beyond the sender's local network. We follow messages from their origin through multiple retweets to identify which messages have more reach, and the different users who are exposed.We collected three months of publicly available data from Twitter. A combination of techniques in social network analysis and content analysis were applied to determine the various networks of users who are exposed to e-cigarette messages and how the retweet network can affect which messages spread.The Blu retweet network expanded during the study period. Analysis of user profiles combined with network cluster analysis showed that messages of certain topics were only circulated within a community of e-cigarette supporters, while other topics spread further, reaching more general Twitter users who may not support or use e-cigarettes.Retweet networks can serve as proxy filters for marketing messages, as Twitter users decide which messages they will continue to diffuse among their followers. As certain e-cigarette messages extend beyond their point of origin, the audience being exposed expands beyond the e-cigarette community. Potential implications for health education campaigns include utilizing Twitter and targeting important gatekeepers or hubs that would maximize message diffusion.

  6. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  7. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  8. A Software Implementation of a Satellite Interface Message Processor.

    Science.gov (United States)

    Eastwood, Margaret A.; Eastwood, Lester F., Jr.

    A design for network control software for a computer network is described in which some nodes are linked by a communications satellite channel. It is assumed that the network has an ARPANET-like configuration; that is, that specialized processors at each node are responsible for message switching and network control. The purpose of the control…

  9. Crafting a Real-Time Information Aggregator for Mobile Messaging

    Directory of Open Access Journals (Sweden)

    Jenq-Shiou Leu

    2010-01-01

    Full Text Available Mobile messaging is evolving beyond SMS (Short Message Service text messaging with the introduction of MMS (Multimedia Messaging Service. In the past, such a scheme is used for peer-to-peer communication. Messages are generally displayed on a cellular phone with a limited-sized screen. However, such a visualizing process is not suitable to broadcast real-time SMS/MMS messages to people in public. To facilitate the instancy and publicity, we develop a real-time information aggregator—Visualizing SMS and MMS Messages System (VSMMS—to realize the concept by integrating SMS and MMS messaging over GSM/GPRS/UMTS onto a remote display device. The device exhibits messages on a larger display device in public. VSMMS features a revolutionized variation of mass media broadcasting. In this paper, we practically illustrate how to design and implement VSMMS and use a M/M/1 model to conduct a theoretical analysis about the message delay in the system queue. Meanwhile, we make an empirical performance evaluation about the message transmission time over different networks.

  10. College Students' Text Messaging, Use of Textese and Literacy Skills

    Science.gov (United States)

    Drouin, M. A.

    2011-01-01

    In this study, I examined reported frequency of text messaging, use of textese and literacy skills (reading accuracy, spelling and reading fluency) in a sample of American college students. Participants reported using text messaging, social networking sites and textese more often than was reported in previous (2009) research, and their frequency…

  11. Instant Messaging by SIP

    Science.gov (United States)

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  12. Coordination of the international network of nuclear structure and decay data evaluators. Summary report of an IAEA advisory group meeting

    International Nuclear Information System (INIS)

    Muir, D.W.; Pronyaev, V.G.

    1998-03-01

    The international network of nuclear structure and decay data (NSDD) evaluators aims at a complete and periodic nuclear structure and decay data evaluation of all nuclides, the continuous publication of these evaluations and their dissemination to the scientific community. The evaluated data resulting from this concerted international effort are introduced in the Evaluated Structure and Decay Data File (ENSDF) and published in the journals Nuclear Physics A and Nuclear Data Sheets. Periodic meetings of this network are held in order to maintain the coordination of all centres and groups participating in the compilation, evaluation and dissemination of NSDD, to maintain and improve the standards and rules governing NSDS evaluation, and to review the development and common use of the computerized systems and databases maintained specifically for this activity. This document is a summary report of the twelfth Meeting on the Coordination of the NSDD Evaluators held between 14-18 October 1996 in Budapest, Hungary

  13. 78 FR 70954 - Risk Communications Advisory Committee; Notice of Meeting

    Science.gov (United States)

    2013-11-27

    ... awareness and understanding of the key risk messages, as well as whether the communications are having the... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration [Docket No. FDA-2013-N-0001] Risk Communications Advisory Committee; Notice of Meeting AGENCY: Food and Drug Administration, HHS...

  14. Report of the advisory group meeting on the establishment of regional ion accelerator centers and user networks

    International Nuclear Information System (INIS)

    1997-11-01

    In this report it is shown that ion accelerators have had a tremendous economic and technological impact on most developed countries, and are beginning to have a significant impact on developing countries. Through the formation of Accelerator Centers and User Networks (which may be national, regional or inter-regional) a mechanism will be outlined by which scientists and other users from developing countries can receive the necessary training and have available the necessary accelerator facilities to use these machines for economic improvement and technological development in their countries

  15. Hashtag (# as Message Identity in Virtual Community

    Directory of Open Access Journals (Sweden)

    Urip Mulyadi

    2018-02-01

    Full Text Available Computer Mediated Communication or CMC is able to present a virtual community, where the people inside have the same interest to share information related to events, activities, competitions, entertainment, history, event and others in Semarang City for publication. This research attempted to describe that hashtags can be utilized as the identity of a message in a communications network on Facebook Group MIK Semar. The results of this study are hashtags have changed how we build a virtual community, as the use of hashtags in Facebook Group MIK SEMAR as message identity to build better relationship and support communication among its members.

  16. RSA Key Development Using Fingerprint Image on Text Message

    Science.gov (United States)

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti

    2017-12-01

    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  17. Mentorship through advisory colleges.

    Science.gov (United States)

    Murr, Andrew H; Miller, Carol; Papadakis, Maxine

    2002-11-01

    Medical students face pressures ranging from the need to create a social network to learning vast amounts of scientific material. Students often feel isolated in this system and lack mentorship. In order to counteract feelings of bureaucratic anonymity and isolation, the University of California San Francisco has created an advisory college to foster the professional and personal growth and well being of students. UCSF has developed a formal structure to advise medical students. A selection committee, chaired by the associate dean of student affairs, appointed five faculty mentors to head advisory colleges. These five colleges serve as the advising and well-being infrastructure for the students. Mentors were chosen from a balanced range of clinical disciplines, both primary and specialty. The disciplines are obstetrics-gynecology, otolaryngology/head and neck surgery, medicine, pediatrics, and psychiatry. The mentors have demonstrated excellence in advising and counseling of students. Mentors meet individually at the beginning of the academic year with incoming first-year and second-year students. They then have bimonthly meetings with eight to ten students within each college throughout the academic year. Curricula for these group sessions include well-being discussions and coping techniques, sessions on the hidden and informal curriculum of professionalism, and discussions on career choices and strategies. For third-year students, advisory college meetings are scheduled during intersessions, which are weeklong courses that occur between the eight-week clerkship blocks. Mentors are available throughout the year to meet with students on an as-needed basis, and advisory colleges may hold group social activities. The dean's office supports each mentor with 20% salary and provides administrative support for the group college activities. Historically, UCSF students feel they receive an excellent education and appropriate job opportunities, but they do not feel they

  18. The message is the message-maker.

    Science.gov (United States)

    Chalkley, A B

    1977-03-01

    For those engaged in family planning or other demographic work of an active kind, serious errors can be made and much money and skill wasted unless there is a clear idea of available means of communication. Literacy and media-diffusion figures offer vague parameters, especially in Asia, and the role of spoken communication -- considered key in "illiterate" societies -- is even more difficult to assess. For mass media, the starting point is "diffusion rates" representing numbers of TV sets owned or newspapers sold per 1000 population and so on -- measures of quantity. This article surveys the population growth rates, urban-rural distribution, educational levels, literacy rates, numbers of newspapers bought, radios and TVs owned (per 1000 population) for 12 Asian countries, and discusses their meaning in terms of media use. Chief among the points made are that print media still have an enormous role to play in the developing countries -- newspaper diffusion rates are quite high, even in countries with low urban population (especially India). The quality of electronic media (too often considered the natural "wave of the future" everywhere) varies but is generally not high. Where they are fully developed their role is vital -- but it might be noted that it is the message makers themselves who are most vital. Choosing the right medium and the proper message for it is essential.

  19. What's in a message? Delivering sexual health promotion to young people in Australia via text messaging

    Directory of Open Access Journals (Sweden)

    Hellard Margaret E

    2010-12-01

    Full Text Available Abstract Background Advances in communication technologies have dramatically changed how individuals access information and communicate. Recent studies have found that mobile phone text messages (SMS can be used successfully for short-term behaviour change. However there is no published information examining the acceptability, utility and efficacy of different characteristics of health promotion SMS. This paper presents the results of evaluation focus groups among participants who received twelve sexual health related SMS as part of a study examining the impact of text messaging for sexual health promotion to on young people in Victoria, Australia. Methods Eight gender-segregated focus groups were held with 21 males and 22 females in August 2008. Transcripts of audio recordings were analysed using thematic analysis. Data were coded under one or more themes. Results Text messages were viewed as an acceptable and 'personal' means of health promotion, with participants particularly valuing the informal language. There was a preference for messages that were positive, relevant and short and for messages to cover a variety of topics. Participants were more likely to remember and share messages that were funny, rhymed and/or tied into particular annual events. The message broadcasting, generally fortnightly on Friday afternoons, was viewed as appropriate. Participants said the messages provided new information, a reminder of existing information and reduced apprehension about testing for sexually transmitted infections. Conclusions Mobile phones, in particular SMS, offer health promoters an exciting opportunity to engage personally with a huge number of individuals for low cost. The key elements emerging from this evaluation, such as message style, language and broadcast schedule are directly relevant to future studies using SMS for health promotion, as well as for future health promotion interventions in other mediums that require short formats, such

  20. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    Science.gov (United States)

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  1. Popular Mobilization Messaging

    Directory of Open Access Journals (Sweden)

    James Garrison

    2017-04-01

    Full Text Available This Research Paper examines the Iraqi Popular Mobilization Unit’s (PMU messaging on the organisation’s website and social media platforms through early January 2017 to develop a more nuanced understanding of the PMU’s outlook, both present and future. After providing an overview of the PMU’s media presence online, the paper discusses how the organisation promotes its core narrative: that it is a cross-confessional and patriotic force for the defence of all Iraqis against a brutal and evil IS. The paper then addresses the PMU’s use of messaging to refute the sectarian portrayal of the organisation in some quarters before turning to the way the PMU approaches regional and international states in its media. Finally, the paper summarises the PMU’s messaging strategy and discusses how this strategy implies a less threatening future for the organisation than is often anticipated.

  2. SMS Messaging Applications

    CERN Document Server

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  3. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-01-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require an application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI open-quote C close-quote and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  4. Kompresi Teks Menggunakan Algoritma Huffman Dan Md5 Pada Instant Messaging Smartphone Android

    OpenAIRE

    Chulkamdi, M. Taofik; Pramono, Sholeh Hadi; Yudaningtyas, Erni

    2015-01-01

    Instant messaging is one of Android social media application that make user possible to send short messages directly in the same time (real time) using text to another user that online in the some network, more ever a lot of user using this application as an alternative communication via short message service (SMS). Remembering how important this application, so writer make an instant message application with small text transmission that will provide in the current needs with Huffman algorith...

  5. DIRECTIONAL OPPORTUNISTIC MECHANISM IN CLUSTER MESSAGE CRITICALITY LEVEL BASED ZIGBEE ROUTING

    OpenAIRE

    B.Rajeshkanna *1, Dr.M.Anitha 2

    2018-01-01

    The cluster message criticality level based zigbee routing(CMCLZOR) has been proposed for routing the cluster messages in wireless smart energy home area networks. It employs zigbee opportunistic shortcut tree routing(ZOSTR) and AODV individually for routing normal messages and highly critical messages respectively. ZOSTR allows the receiving nodes to compete for forwarding a packet with the priority of left-over hops rather than stating single next hop node like unicast protocols. Since it h...

  6. Are Instant Messages Speech?

    Science.gov (United States)

    Baron, Naomi S.

    Instant messaging (IM) is commonly viewed as a “spoken” medium, in light of its reputation for informality, non-standard spelling and punctuation, and use of lexical shortenings and emoticons. However, the actual nature of IM is an empirical issue that bears linguistic analysis.

  7. Microprocessorized message multiplexer

    International Nuclear Information System (INIS)

    Ejzman, S.; Guglielmi, L.; Jaeger, J.J.

    1980-07-01

    The 'Microprocessorized Message Multiplexer' is an elementary development tool used to create and debug the software of a target microprocessor (User Module: UM). It connects together four devices: a terminal, a cassette recorder, the target microprocessor and a host computer where macro and editor for the M 6800 microprocessor are resident [fr

  8. Grounding in Instant Messaging

    Science.gov (United States)

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  9. The Prodiguer Messaging Platform

    Science.gov (United States)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  10. 3. Secure Messaging

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 1. Electronic Commerce - Secure Messaging. V Rajaraman. Series Article Volume 6 Issue 1 January 2001 pp 8-17. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/01/0008-0017 ...

  11. Does the Screening Status of Message Characters Affect Message Effects?

    Science.gov (United States)

    Alber, Julia M.; Glanz, Karen

    2018-01-01

    Public health messages can be used to increase awareness about colorectal cancer screenings. Free or inexpensive images for creating health messages are readily available, yet little is known about how a pictured individual's engagement in the behavior of interest affects message outcomes. Participants (N = 360), aged 50 to 75 years, completed an…

  12. 78 FR 69991 - Advisory Committee; Veterinary Medicine Advisory Committee; Termination

    Science.gov (United States)

    2013-11-22

    .... FDA-2013-N-1380] Advisory Committee; Veterinary Medicine Advisory Committee; Termination AGENCY: Food... announcing the termination of the Veterinary Medicine Advisory Committee. This document removes the Veterinary Advisory Committee from the Agency's list of standing advisory committees. DATES: This rule is...

  13. Degree sequence in message transfer

    Science.gov (United States)

    Yamuna, M.

    2017-11-01

    Message encryption is always an issue in current communication scenario. Methods are being devised using various domains. Graphs satisfy numerous unique properties which can be used for message transfer. In this paper, I propose a message encryption method based on degree sequence of graphs.

  14. Message from Fermilab Director

    CERN Multimedia

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  15. Synchronous message-based communication for distributed heterogeneous systems

    International Nuclear Information System (INIS)

    Wilkinson, N.; Dohan, D.

    1992-01-01

    The use of a synchronous, message-based real-time operating system (Unison) as the basis of transparent interprocess and inter-processor communication over VME-bus is described. The implementation of a synchronous, message-based protocol for network communication between heterogeneous systems is discussed. In particular, the design and implementation of a message-based session layer over a virtual circuit transport layer protocol using UDP/IP is described. Inter-process communication is achieved via a message-based semantic which is portable by virtue of its ease of implementation in other operating system environments. Protocol performance for network communication among heterogeneous architecture is presented, including VMS, Unix, Mach and Unison. (author)

  16. A message passing algorithm for the evaluation of social influence

    NARCIS (Netherlands)

    Vassio, Luca; Fagnani, Fabio; Frasca, Paolo; Ozdaglar, Asuman

    2014-01-01

    In this paper, we define a new measure of node centrality in social networks, the Harmonic Influence Centrality, which emerges naturally in the study of social influence over networks. Next, we introduce a distributed message passing algorithm to compute the Harmonic Influence Centrality of each

  17. Expanding the Scope of Instant Messaging with Bidirectional Haptic Communication

    OpenAIRE

    Kim, Youngjae; Hahn, Minsoo

    2010-01-01

    This work was conducted on the combination of two fields, i.e., haptic and social messaging. Haptic is one of the most attention-drawing fields and the biggest buzzwords among nextgeneration users. Haptic is being applied to conventional devices such as the cellular phone and even the door lock. Diverse forms of media such as blogs, social network services, and instant messengers are used to send and receive messages. That is mainly why we focus on the messaging experience, the most frequent ...

  18. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  19. Perancangan dan Implementasi Sistem Informasi Layanan Short Messaging Service (SMS)

    OpenAIRE

    Rossy W, Cahyo; Wellem, Theophilus; Utomo, Wiranto Herry

    2006-01-01

    Development progress of Communication technology increase in a line with the people demand of the technology, such as Wireless communication technology, especially, Global System for Mobile Communication (GSM), which known as a digital mobile phone. Mobile phone used to send and receive short message in GSM network known as Short Messaging Service (SMS), besides communicate with another person by voice. In recent years, SMS is not just used for text-based communication tool between mobile pho...

  20. Librarians’ messages to publishers: turning research into practice

    Directory of Open Access Journals (Sweden)

    Bernie Folan

    2017-11-01

    Full Text Available In early 2017 a piece of research was carried out via questionnaire asking librarians to share the messages they wanted to convey to publishers. There was the option of anonymous submission to encourage candour. This research aimed to supplement messages offered to publishers and other organizations via library advisory board meetings, conference talks and other channels. The hope is to facilitate understanding and to progress the library/publisher partnership that is essential for a healthy future for research communication. A lightning talk at the 2017 UKSG Annual Conference summarized the key findings. This article now shares the findings in more depth and delves into the detail of the most recurrent themes. It also features some organizational case studies which illustrate how the findings are being used practically and/or how these organizations ensure they understand the needs of the libraries they work with. These case studies may help other publishers with the implementation of listening programmes.

  1. Automated endoscopic navigation and advisory system from medical image

    Science.gov (United States)

    Kwoh, Chee K.; Khan, Gul N.; Gillies, Duncan F.

    1999-05-01

    , which is developed to obtain the relative depth of the colon surface in the image by assuming a point light source very close to the camera. If we assume the colon has a shape similar to a tube, then a reasonable approximation of the position of the center of the colon (lumen) will be a function of the direction in which the majority of the normal vectors of shape are pointing. The second layer is the control layer and at this level, a decision model must be built for endoscope navigation and advisory system. The system that we built is the models of probabilistic networks that create a basic, artificial intelligence system for navigation in the colon. We have constructed the probabilistic networks from correlated objective data using the maximum weighted spanning tree algorithm. In the construction of a probabilistic network, it is always assumed that the variables starting from the same parent are conditionally independent. However, this may not hold and will give rise to incorrect inferences. In these cases, we proposed the creation of a hidden node to modify the network topology, which in effect models the dependency of correlated variables, to solve the problem. The conditional probability matrices linking the hidden node to its neighbors are determined using a gradient descent method which minimizing the objective cost function. The error gradients can be treated as updating messages and ca be propagated in any direction throughout any singly connected network to adjust the network parameters. With the above two- level approach, we have been able to build an automated endoscope navigation and advisory system successfully.

  2. Source Similarity and Social Media Health Messages: Extending Construal Level Theory to Message Sources.

    Science.gov (United States)

    Young, Rachel

    2015-09-01

    Social media users post messages about health goals and behaviors to online social networks. Compared with more traditional sources of health communication such as physicians or health journalists, peer sources are likely to be perceived as more socially close or similar, which influences how messages are processed. This experimental study uses construal level theory of psychological distance to predict how mediated health messages from peers influence health-related cognition and behavioral intention. Participants were exposed to source cues that identified peer sources as being either highly attitudinally and demographically similar to or different from participants. As predicted by construal level theory, participants who perceived sources of social media health messages as highly similar listed a greater proportion of beliefs about the feasibility of health behaviors and a greater proportion of negative beliefs, while participants who perceived sources as more dissimilar listed a greater proportion of positive beliefs about the health behaviors. Results of the study could be useful in determining how health messages from peers could encourage individuals to set realistic health goals.

  3. A Messaging Infrastructure for WLCG

    International Nuclear Information System (INIS)

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-01-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  4. Survey of Instant Messaging Applications Encryption Methods

    OpenAIRE

    Kabakuş, Abdullah; Kara, Resul

    2015-01-01

    Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Reali...

  5. Getting Your Message Across: Mobile Phone Text Messaging

    Science.gov (United States)

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  6. A Visualized Message Interface (VMI) for intelligent messaging services

    International Nuclear Information System (INIS)

    Endo, T.; Kasahara, H.; Nakagawa, T.

    1984-01-01

    In CCITT, Message Handling Systems (MHS) have been studied from the viewpoint of communications protocol standardization. In addition to MHS services, Message Processing (MP) services, such as image processing, filing and retrieving services, will come into increasing demand in office automation field. These messaging services, including MHS services, can be thought of as Intelligent Messaging (IM) services. IM services include many basic services, optional user facilities and service parameters. Accordingly, it is necessary to deal with these parameters and MP procedures in as systematic and user-friendly a manner as possible. As one step towards realizing a user-friendly IM services interface, the characteristics of IM service parameters are studied and a Visualized Message Interface (VMI) which resembles a conventional letter exchange format is presented. The concept of VMI formation is discussed using the generic document structure concept as well as a Screen Interface and Protocol Interface conversion package

  7. Advisory Committee Handbook.

    Science.gov (United States)

    Black Hawk Coll., Moline, IL.

    An advisory committee is generally comprised of persons outside the education profession who have specialized knowledge in a given area. The committee advises, makes recommendations, and gives service to the college and its students, instructors, and administrators. At Black Hawk College, there are four types of advisory committees: community,…

  8. ZeroMQ messaging for many applications

    CERN Document Server

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  9. Class network routing

    Science.gov (United States)

    Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  10. Emergency Message Dissemination System for Smartphones During Natural Disasters

    NARCIS (Netherlands)

    Wu, Xian; Mazurowski, Maciej; Chen, Zhen; Meratnia, Nirvana

    This paper revolves around the concept of utilizing the modern smartphone communication capabilities to transmit messages through an ad hoc network during a disaster, which renders the traditional cellular base station inaccessible. Due to dynamic and decentralized nature of the considered

  11. A Massively Scalable Architecture for Instant Messaging & Presence

    NARCIS (Netherlands)

    Schippers, Jorrit; Remke, Anne Katharina Ingrid; Punt, Henk; Wegdam, M.; Haverkort, Boudewijn R.H.M.; Thomas, N.; Bradley, J.; Knottenbelt, W.; Dingle, N.; Harder, U.

    2010-01-01

    This paper analyzes the scalability of Instant Messaging & Presence (IM&P) architectures. We take a queueing-based modelling and analysis approach to ��?nd the bottlenecks of the current IM&P architecture at the Dutch social network Hyves, as well as of alternative architectures. We use the

  12. Telemetry Standards, RCC Standard 106-17. Chapter 24. Message Formats

    Science.gov (United States)

    2017-07-01

    Structure A TSS data message is a wrapper used to aid specialized routing of network traffic between TmNS networks over other networks . The structure of...IP)- network systems and, therefore, are not required to comply with the big -endian convention. The IP specification defines standard network byte...numeric values in TmNSMessageHeader and PackageHeader fields of the TmNSMessage as following network byte order (i.e., big -endian). 24.2.1

  13. GPS Ephemeris Message Broadcast Simulation

    National Research Council Canada - National Science Library

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  14. Innovation Networks to Stimulate Public and Private Sector Collaboration for Advisory Services Innovation and Coordination: The Case of Pasture Performance Issues in the New Zealand Dairy Industry

    Science.gov (United States)

    Rijswijk, K.; Brazendale, R.

    2017-01-01

    Purpose: An innovation network, called the Pasture Improvement Leadership Group (PILG), was formed to improve the quality and consistency of advice provided to dairy farmers in New Zealand, after they expressed dissatisfaction with their pastures. The aim of this paper is to better understand the challenges of forming and maintaining networks to…

  15. Military Message Experiment. Volume II.

    Science.gov (United States)

    1982-04-01

    elements of the Department of Defense. This resulted in a memorandum from the Director, Telecomunications and Comand and Control, OSD, in June 1975...1978 to April 1979 and provides a discussion of the telecomunications inter- face aspects of the experiment. This Final Report covers the period of...arise in the telecomunication system which require A retransmission of an outgoing message. A "service" message may be created within the

  16. VSWI Wetlands Advisory Layer

    Data.gov (United States)

    Vermont Center for Geographic Information — This dataset represents the DEC Wetlands Program's Advisory layer. This layer makes the most up-to-date, non-jurisdictional, wetlands mapping avaiable to the public...

  17. Layered virus protection for the operations and administrative messaging system

    Science.gov (United States)

    Cortez, R. H.

    2002-01-01

    NASA's Deep Space Network (DSN) is critical in supporting the wide variety of operating and plannedunmanned flight projects. For day-to-day operations it relies on email communication between the three Deep Space Communication Complexes (Canberra, Goldstone, Madrid) and NASA's Jet Propulsion Laboratory. The Operations & Administrative Messaging system, based on the Microsoft Windows NTand Exchange platform, provides the infrastructure that is required for reliable, mission-critical messaging. The reliability of this system, however, is threatened by the proliferation of email viruses that continue to spread at alarming rates. A layered approach to email security has been implemented across the DSN to protect against this threat.

  18. Development of a Social DTN for Message Communication between SNS Group Members

    Directory of Open Access Journals (Sweden)

    Hidenori Takasuka

    2018-04-01

    Full Text Available Smartphones have the ability to communicate with other terminals through ad hoc connections. A variety of applications have been developed to exploit this ability. The authors have developed an Android OS (operating system application (called “social DTN manager” that builds a DTN (delay, disruption, disconnection tolerant networking among members of a social networking service (SNS community using a community token. The members can exchange messages over this network. Control messages for building a DTN are forwarded to only those nodes that use the same community token in order to reduce flooding of message copies. When a source node sends a communication request to its destination node, they exchange control messages to establish a communication route. Relay nodes use these messages to create and hold routing information for these nodes in their routing tables. Thereafter, relay nodes can forward data messages based on their routing tables. This again reduces flooding of message copies. The social DTN manager incorporates these functions, Facebook Graph API and Google Nearby Connections API. The authors have installed it in Android terminals and confirmed that a social DTN can successfully be built using this application and that data messages can be exchanged between terminals via reactive routes.

  19. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  20. Confirm Content Validity and Sender Authenticity for Text Messages by Using QR Code

    Directory of Open Access Journals (Sweden)

    Firas Mohammed Aswad

    2018-05-01

    Full Text Available In light of the information revolution taking place in the modern world, therefore it becomes necessary and important to save this electronic messages. So we offered this technique to ensure the safety of the content of the messages and authenticity of the sender through  networks communication by converting the message's symbols to numbers , each one of this symbols (letters, numbers, symbols will converted into three digits, the first digit represents the ASCII code of the symbol , the second digit represents the frequency of this symbol in the message (the number of times this symbol is appear in the message, and the third digit represents the total number of the locations of the symbol (calculates the symbol location from the first symbol in the message to this symbol itself and blanks also calculated too .The digital signature of the sender will converted to numbers like the symbols of message we explained it before, and this numbers of the digital signature will gathering together to produce three numbers only, this number will gathering with each numbers of the message's symbols, the final  numbers will converted to QR Code , the QR Code will placed with the message and sent to the recipient. The recipient returns the steps of the sender (produce QR Code from the received message and compared it the received QR Codes, if it is match or not. The recipient will ensure that the content is secure, and confirms the authenticity of the sender.

  1. MessageSpace: a messaging system for health research

    Science.gov (United States)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  2. 78 FR 10169 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Science.gov (United States)

    2013-02-13

    ... Location Accuracy, Network Security Best Practices, DNSSEC Implementation Practices for ISPs, Secure BGP... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... persons that the Federal Communications Commission's (FCC) Communications Security, Reliability, and...

  3. 76 FR 72922 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Science.gov (United States)

    2011-11-28

    ... alerting systems, 9-1-1 location accuracy, and network security. The FCC will attempt to accommodate as... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... persons that the Federal Communications Commission's (FCC) third Communications Security, Reliability, and...

  4. Reactions to threatening health messages.

    Science.gov (United States)

    Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo

    2012-11-21

    Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  5. Message Collision Avoidance Protocols for Detecting Stray Nodes in a Scuba Diving Group Using Ultrasonic Multi-Hop Message Communication

    Directory of Open Access Journals (Sweden)

    Shinya Kaido

    2017-12-01

    Full Text Available Recent years have seen a growing interest in underwater communication and some progress has been made in this area. However, underwater communication is still immature compared with terrestrial communication. A prime reason for this is that the underwater environment is intrinsically not suitable for propagation of electric waves. Instead, ultrasonic waves are mainly used for underwater communication. Since ultrasonic waves cannot provide sufficient communication speed or capacity, they cannot use existing network technologies, which assume use of radio waves. In particular, communication in shallow water is still an uncharted territory. Few communication technologies are employed in environments where people enjoy scuba diving. This paper addresses problems faced by recreational scuba divers. It proposes constructing an ad hoc mesh-shaped network between divers within a group and use ultrasonic waves as transmission media in order to enable the detection of a stray diver. It also proposes a communication protocol in which messages are relayed in multiple hops, and a message collision avoidance method, which is intended to reduce the rate of packet loss caused by message propagation delay. We have implemented the proposed methods in a network simulator, and compared them with an existing communication method that has no message collision avoidance function, in terms of the packet loss rate, the stray driver detection rate, and the rate of the ability to communicate in multiple hops.

  6. Influence of farmers educational level on comprehending, acting-upon and sharing of agro advisories

    Directory of Open Access Journals (Sweden)

    M. J. Chandre Gowda

    2015-10-01

    Full Text Available Although short messaging service (SMS through mobile phones has quickly gained popularity among most other sectors in India, its potential is not fully realised in the agriculture sector as a cost effective service to reach farmers and elicit desirable action. Despite the cost effectiveness, mobile messaging has remained a challenge in the farming sector in terms of its end use and action as far as extension systems are concerned. While there could be many influencing factors affecting the utility of mobile messages, this study assumed that educational level of farmers could be a major factor. A telephone survey was conducted to ascertain the influence of farmers’ education on the level of utilisation of mobile-based advisories. Farmers with higher education level showed better comprehension of advisories, acted-upon the advisories more promptly and shared the information with fellow farmers more often than those with lower education level. There was a significant association between comprehending, sharing and acting upon advisories. This has implications to achieve enhanced extension reach with higher efficiency in terms of cost and time.

  7. Extracting messages masked by chaos

    International Nuclear Information System (INIS)

    Perez, G.; Cerdeira, H.A.

    1995-01-01

    We show how to extract messages that are masked by a chaotic signal in a system of two Lorenz oscillators. This mask removal is done for two different modes of transmission, a digital one where a parameter of the sender is switched between two values, and an analog mode, where a small amplitude message is added to the carrier signal. We achieve this without using a second Lorenz oscillator as receiver, and without doing a full reconstruction of the dynamics. This method is robust with respect to transformations that impede the unmasking using a Lorenz receiver, and is not affected by the broad-band noise that is inherent to the synchronization process. We also discuss the limitations of this way of extraction for messages in high frequency bands. (author). 12 refs, 4 figs

  8. MESA: Message-Based System Analysis Using Runtime Verification

    Science.gov (United States)

    Shafiei, Nastaran; Tkachuk, Oksana; Mehlitz, Peter

    2017-01-01

    In this paper, we present a novel approach and framework for run-time verication of large, safety critical messaging systems. This work was motivated by verifying the System Wide Information Management (SWIM) project of the Federal Aviation Administration (FAA). SWIM provides live air traffic, site and weather data streams for the whole National Airspace System (NAS), which can easily amount to several hundred messages per second. Such safety critical systems cannot be instrumented, therefore, verification and monitoring has to happen using a nonintrusive approach, by connecting to a variety of network interfaces. Due to a large number of potential properties to check, the verification framework needs to support efficient formulation of properties with a suitable Domain Specific Language (DSL). Our approach is to utilize a distributed system that is geared towards connectivity and scalability and interface it at the message queue level to a powerful verification engine. We implemented our approach in the tool called MESA: Message-Based System Analysis, which leverages the open source projects RACE (Runtime for Airspace Concept Evaluation) and TraceContract. RACE is a platform for instantiating and running highly concurrent and distributed systems and enables connectivity to SWIM and scalability. TraceContract is a runtime verication tool that allows for checking traces against properties specified in a powerful DSL. We applied our approach to verify a SWIM service against several requirements.We found errors such as duplicate and out-of-order messages.

  9. 77 FR 69869 - National Advisory Council on Alcohol Abuse and Alcoholism, National Advisory Council on Drug...

    Science.gov (United States)

    2012-11-21

    ... Alcohol Abuse and Alcoholism, National Advisory Council on Drug Abuse, and National Cancer Advisory Board... Advisory Council on Alcohol Abuse and Alcoholism, National Advisory Council on Drug Abuse, and National...: National Advisory Council on Alcohol Abuse and Alcoholism, National Advisory Council on Drug Abuse, and...

  10. Consumer attitudes and risks associated with packaged foods having advisory labeling regarding the presence of peanuts.

    Science.gov (United States)

    Hefle, Susan L; Furlong, Terence J; Niemann, Lynn; Lemon-Mule, Heather; Sicherer, Scott; Taylor, Steve L

    2007-07-01

    Foods with advisory labeling (eg, "may contain") are increasingly prevalent. Consumers with food allergies might ignore advisory labeling advice. We sought to determine whether consumers with food allergy heeded advisory labels and whether products with advisory labels contained detectable peanut allergen. Surveys (n = 625 in 2003 and n = 645 in 2006) were conducted at Food Allergy & Anaphylaxis Network patient conferences. Food products bearing advisory statements regarding peanuts were analyzed for the presence of peanut. Consumers were less likely to heed advisory labeling in 2006 (75%) compared with in 2003 (85%, P 1 mg of peanut or >0.25 mg of peanut protein) were detected in only 13 of 200 such products. Consumers with food allergy are increasingly ignoring advisory labeling. Because food products with advisory labeling do contain detectable levels of peanuts, a risk exists to consumers choosing to eat such foods. The format of the labeling statement did not influence the likelihood of finding detectable peanut, except for products listing peanuts as a minor ingredient, but did influence the choices of consumers with food allergy. Allergic patients are taking risks by increasingly disregarding advisory labeling.

  11. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Directory of Open Access Journals (Sweden)

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  12. Protocol for multiple node network

    Science.gov (United States)

    Kirkham, Harold (Inventor)

    1995-01-01

    The invention is a multiple interconnected network of intelligent message-repeating remote nodes which employs an antibody recognition message termination process performed by all remote nodes and a remote node polling process performed by other nodes which are master units controlling remote nodes in respective zones of the network assigned to respective master nodes. Each remote node repeats only those messages originated in the local zone, to provide isolation among the master nodes.

  13. Mensajes con fines publicitarios que tornan en Relaciones Públicas en las redes sociales: el caso de Starbucks España y Cash Converters España. The messages for advertising purposes which turn in Public Relations in social networks: the case of Starbucks

    Directory of Open Access Journals (Sweden)

    Carlos García Carballo

    2012-12-01

    Converters in Spain are among the few organizations operating in the Spanish market that perform this type of communication strategy in social networks, and therefore, were chosen for analysis. This object of study are those issued by communicative messages directed at their public organizations that are in social networks, these messages for purely advertising are treated that are proper and recognized as public relations. This new form of communication is what appears to be the near future in communications and relations with public organizations in these social platforms.

  14. National Child Traumatic Stress Network

    Science.gov (United States)

    ... Safety Effects of Trauma The 3 R's: School Crises and Disasters Service Interventions Resources for Schools Trauma ... Center National Advisory Board Steering Committee Network Members Organizational Members Affiliated Professionals Geographical Map NCTSN Position Statements ...

  15. Soft real-time alarm messages for ATLAS TDAQ

    Science.gov (United States)

    Darlea, G.; Al Shabibi, A.; Martin, B.; Lehmann Miotto, G.

    2010-05-01

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG—Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring "interesting" parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  16. Soft real-time alarm messages for ATLAS TDAQ

    International Nuclear Information System (INIS)

    Darlea, G.; Al Shabibi, A.; Martin, B.; Lehmann Miotto, G.

    2010-01-01

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG-Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring 'interesting' parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  17. Soft real-time alarm messages for ATLAS TDAQ

    Energy Technology Data Exchange (ETDEWEB)

    Darlea, G., E-mail: georgiana.lavinia.darlea@cern.c [CERN, Geneva (Switzerland); Al Shabibi, A.; Martin, B.; Lehmann Miotto, G. [CERN, Geneva (Switzerland)

    2010-05-21

    The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG-Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring 'interesting' parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.

  18. Radiating Messages: An International Perspective.

    Science.gov (United States)

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  19. Re: Design Changing the Message

    Science.gov (United States)

    Wall, Miranda Wakeman

    2008-01-01

    The advertisements that flood everyone's visual culture are designed to create desire. From the author's experience, most high school students are not aware of the messages that they are bombarded with every day, and if they are, few care or think about them critically. The author's goals for this lesson were to increase students' awareness of the…

  20. Instant Apache Camel message routing

    CERN Document Server

    Ibryam, Bilgin

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This short, instruction-based guide shows you how to perform application integration using the industry standard Enterprise Integration Patterns.This book is intended for Java developers who are new to Apache Camel and message- oriented applications.

  1. The Media and the Message.

    Science.gov (United States)

    Cook, Glenn

    2001-01-01

    The experiences of Columbine and El Cajon high schools with media onslaughts following traumatic shooting incidents underscore the importance of getting the message across and sticking to known facts. In a crisis, speculation can hurt everyone. The most important elements in crisis communications are planning and media relations. (MLH)

  2. Spatial variation in messaging effects

    Science.gov (United States)

    Warshaw, Christopher

    2018-05-01

    There is large geographic variation in the public's views about climate change in the United States. Research now shows that climate messages can influence public beliefs about the scientific consensus on climate change, particularly in the places that are initially more skeptical.

  3. Co-ordination of the international network of nuclear structure and decay data evaluators. Summary report of an IAEA advisory group meeting

    International Nuclear Information System (INIS)

    Pronyaev, V.G.

    1999-03-01

    The IAEA Nuclear Data Section convened the thirteenth meeting of the International Nuclear Structure and Decay Data Evaluators Network at the IAEA Headquarters, Vienna, 14-17 December 1998. The meeting was attended by 30 scientists from 10 Member States and 2 international organizations concerned with compilation, evaluation, and dissemination of nuclear structure and decay data. The present document contains a meeting summary, the conclusions and recommendations, the data center reports and proposals considered by the participants. (author)

  4. Co-ordination of the international network of nuclear structure and decay data evaluators. Summary report of an IAEA advisory group meeting

    Energy Technology Data Exchange (ETDEWEB)

    Pronyaev, V G

    2001-02-01

    The IAEA Nuclear Data Section convened the fourteenth meeting of the International Nuclear Structure and Decay Data Evaluators Network at IAEA Headquarters, Vienna, 4-7 December 2000. The meeting was attended by 22 scientists from 7 Member States and 1 international organization concerned with compilation, evaluation, and dissemination of nuclear structure and decay data. The present document contains a meeting summary, the recommendations, the data center reports and proposals considered by the participants. (author)

  5. Message framing strategies to increase influenza immunization uptake among pregnant African American women.

    Science.gov (United States)

    Marsh, Heather A; Malik, Fauzia; Shapiro, Eve; Omer, Saad B; Frew, Paula M

    2014-09-01

    We explored the attitudes, opinions, and concerns of African American women regarding influenza vaccination during pregnancy. As influenza immunization coverage rates remain suboptimal in the United States among this population, we elicited message framing strategies for multicomponent interventions aimed at decreasing future incident cases of maternal and neonatal influenza. Semi-structured in-depth interviews (N = 21) were conducted with pregnant African American women at urban OB/GYN clinics who had not received an influenza vaccine. Interviews were transcribed, subjected to intercoder reliability assessment, and content analyzed to identify common thematic factors related to acceptance of the influenza vaccine and health communication message preferences. Four major themes were identified. These were communication approaches, normal vaccine behavior, pregnancy vaccination, and positive versus negative framing. Two strong themes emerged: positively-framed messages were preferred over negatively-framed messages and those emphasizing the health of the infant. Additionally, previous immunization, message source, and vaccine misperceptions also played important roles in decision-making. The majority of women indicated that positively framed messages focusing on the infant's health would encourage them to receive an influenza vaccine. Messages emphasizing immunization benefits such as protection against preterm birth and low birth weight outcomes have potential to overcome widespread negative community perceptions and cultural beliefs. Additionally, messages transmitted via interpersonal networks and social media strongly influence motivation to obtain vaccination during pregnancy. The findings of this study will assist in developing tailored messages that change pregnant African American women's influenza vaccination decision-making to achieve improved coverage.

  6. Reactions to threatening health messages

    Directory of Open Access Journals (Sweden)

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  7. Representing culture in interstellar messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages . Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  8. Coding for Parallel Links to Maximize the Expected Value of Decodable Messages

    Science.gov (United States)

    Klimesh, Matthew A.; Chang, Christopher S.

    2011-01-01

    When multiple parallel communication links are available, it is useful to consider link-utilization strategies that provide tradeoffs between reliability and throughput. Interesting cases arise when there are three or more available links. Under the model considered, the links have known probabilities of being in working order, and each link has a known capacity. The sender has a number of messages to send to the receiver. Each message has a size and a value (i.e., a worth or priority). Messages may be divided into pieces arbitrarily, and the value of each piece is proportional to its size. The goal is to choose combinations of messages to send on the links so that the expected value of the messages decodable by the receiver is maximized. There are three parts to the innovation: (1) Applying coding to parallel links under the model; (2) Linear programming formulation for finding the optimal combinations of messages to send on the links; and (3) Algorithms for assisting in finding feasible combinations of messages, as support for the linear programming formulation. There are similarities between this innovation and methods developed in the field of network coding. However, network coding has generally been concerned with either maximizing throughput in a fixed network, or robust communication of a fixed volume of data. In contrast, under this model, the throughput is expected to vary depending on the state of the network. Examples of error-correcting codes that are useful under this model but which are not needed under previous models have been found. This model can represent either a one-shot communication attempt, or a stream of communications. Under the one-shot model, message sizes and link capacities are quantities of information (e.g., measured in bits), while under the communications stream model, message sizes and link capacities are information rates (e.g., measured in bits/second). This work has the potential to increase the value of data returned from

  9. Toward Predicting Popularity of Social Marketing Messages

    Science.gov (United States)

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  10. 76 FR 21877 - Environmental Management Advisory Board

    Science.gov (United States)

    2011-04-19

    ... DEPARTMENT OF ENERGY Environmental Management Advisory Board AGENCY: Department of Energy. ACTION: Notice of call for nominations for appointment to the Environmental Management Advisory Board. SUMMARY... Environmental Management Advisory Board. DATES: Nominations will be accepted through May 13, 2011. ADDRESSES...

  11. Improving Type Error Messages in OCaml

    OpenAIRE

    Charguéraud , Arthur

    2015-01-01

    International audience; Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise ...

  12. 78 FR 52166 - Quantitative Messaging Research

    Science.gov (United States)

    2013-08-22

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast-track OMB approval... message testing research (for which CFTC received fast-track OMB approval) and is necessary to identify...

  13. Effects of Text Messaging on Academic Performance

    OpenAIRE

    Barks Amanda; Searight H. Russell; Ratwik Susan

    2011-01-01

    University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were ...

  14. Message exchange in the building industry

    NARCIS (Netherlands)

    Vries, de B.; Somers, L.J.A.M.

    1995-01-01

    A process model is described for exchanging information in the building industry. In this model participants send and receive messages. On receipt of a message an activity is executed if all required information is available. Otherwise a message will be sent to another participant to obtain the

  15. Framing of health information messages.

    Science.gov (United States)

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    -planned subgroup analyses based on the type of message (screening, prevention, and treatment). The primary outcome was behaviour. We did not assess any adverse outcomes. We included 35 studies involving 16,342 participants (all health consumers) and reporting 51 comparisons.In the context of attribute framing, participants in one included study understood the message better when it was framed negatively than when it was framed positively (1 study; SMD -0.58 (95% confidence interval (CI) -0.94 to -0.22); moderate effect size; low quality evidence). Although positively-framed messages may have led to more positive perception of effectiveness than negatively-framed messages (2 studies; SMD 0.36 (95% CI -0.13 to 0.85); small effect size; low quality evidence), there was little or no difference in persuasiveness (11 studies; SMD 0.07 (95% CI -0.23 to 0.37); low quality evidence) and behavior (1 study; SMD 0.09 (95% CI -0.14 to 0.31); moderate quality evidence).In the context of goal framing, loss messages led to a more positive perception of effectiveness compared to gain messages for screening messages (5 studies; SMD -0.30 (95% CI -0.49 to -0.10); small effect size; moderate quality evidence) and may have been more persuasive for treatment messages (3 studies; SMD -0.50 (95% CI -1.04 to 0.04); moderate effect size; very low quality evidence). There was little or no difference in behavior (16 studies; SMD -0.06 (95% CI -0.15 to 0.03); low quality evidence). No study assessed the effect on understanding. Contrary to commonly held beliefs, the available low to moderate quality evidence suggests that both attribute and goal framing may have little if any consistent effect on health consumers' behaviour. The unexplained heterogeneity between studies suggests the possibility of a framing effect under specific conditions. Future research needs to investigate these conditions.

  16. Reactions to threatening health messages

    OpenAIRE

    ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; K?hninger, Constanze; K?lgen, Lizan; Pelssers, Isabelle; Sch?tt, Toby; Thomas, Sophia; Ruiter, Robert AC; Kok, Gerjo

    2012-01-01

    Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence th...

  17. A message to school girls.

    Science.gov (United States)

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  18. A Modular Instant Messaging System

    OpenAIRE

    Mohamad Raad; Zouhair Bazzal; Majd Ghareeb; Hanan Farhat; Semar Bahmad

    2017-01-01

    Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller applicatio...

  19. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  20. Entity-based Classification of Twitter Messages

    OpenAIRE

    Yerva, Surender Reddy; Miklós, Zoltán; Aberer, Karl

    2012-01-01

    Twitter is a popular micro-blogging service on theWeb, where people can enter short messages, which then become visible to some other users of the service. While the topics of these messages varies, there are a lot of messages where the users express their opinions about some companies or their products. These messages are a rich source of information for companies for sentiment analysis or opinion mining. There is however a great obstacle for analyzing the messages directly: as the company n...

  1. The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss

    NARCIS (Netherlands)

    Sundramoorthy, V.; van de Glind, G.J.; Hartel, Pieter H.; Scholten, Johan

    We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. Earlier protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs more

  2. The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss

    NARCIS (Netherlands)

    Sundramoorthy, V.; van de Glind, G.J.; Hartel, Pieter H.; Scholten, Johan

    We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. First generation protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs

  3. Asynchronous Message Service Reference Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to

  4. Guidelines for designing messages in risk communication

    International Nuclear Information System (INIS)

    Takashita, Hirofumi; Horikoshi, Hidehiko

    2004-07-01

    Risk Communication Study Team (hereafter called RC team) has designed messages for risk communication based on the analysis of the local residents' opinions which were expressed in several questionnaire surveys. The messages are described in a side format (Power Point format) every single content. This report provides basic guidelines for making messages that are used for risk communication, and does not include concrete messages which RC team designed. The RC team has already published the report entitled 'Information materials for risk communication' (JNC TN8450 2003-008) separately, and it gives the concrete messages. This report shows general cautions and checklists in designing messages, comments on the messages from outside risk communication experts, and opinions from local residents. (author)

  5. Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications

    Directory of Open Access Journals (Sweden)

    Jorge Herrera-Tapia

    2016-09-01

    Full Text Available Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE simulator and using real human mobility traces.

  6. Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications.

    Science.gov (United States)

    Herrera-Tapia, Jorge; Hernández-Orallo, Enrique; Tomás, Andrés; Manzoni, Pietro; Tavares Calafate, Carlos; Cano, Juan-Carlos

    2016-09-18

    Regular citizens equipped with smart devices are being increasingly used as "sensors" by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces.

  7. Instant Messaging for Creating Interactive and Collaborative m-Learning Environments

    OpenAIRE

    James Kadirire

    2007-01-01

    'Instant Messaging' (IM) and 'Presence,' which is essentially the ability of being able to detect if other users are logged in on the network and send them messages in real time, has become one of the most popular applications of the Internet, causing people to want to stay connected to the Internet for inordinate amounts of time, a phenomena that also fosters a sense of "online community," that perhaps no other application has done previously (Alvestrand, 2002). This research looks at the us...

  8. Improving the effectiveness of fundraising messages: The impact of charity goal attainment, message framing, and evidence on persuasion

    NARCIS (Netherlands)

    Das, E.; Kerkhof, P.; Kuiper, J.

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a

  9. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; Fries, de; Skovlund, Louise

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social qualificati...

  10. Effects of Text Messaging on Academic Performance

    Directory of Open Access Journals (Sweden)

    Barks Amanda

    2011-12-01

    Full Text Available University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were randomly assigned to one of two conditions: 1. a group that sent andreceived text messages during a lecture or, 2. a group that did not engage in text messagingduring the lecture. Participants who engaged in text messaging demonstrated significantlypoorer performance on a test covering lecture content compared with the group that did notsend and receive text messages. Participants exhibiting higher levels of text messaging skill hadsignificantly lower test scores than participants who were less proficient at text messaging. It ishypothesized that in terms of retention of lecture material, more frequent task shifting by thosewith greater text messaging proficiency contributed to poorer performance. Overall, the findingsdo not support the view, held by many university students, that this form of multitasking has littleeffect on the acquisition of lecture content. Results provide empirical support for teachers andprofessors who ban text messaging in the classroom.

  11. Ash cloud aviation advisories

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, T.J.; Ellis, J.S. [Lawrence Livermore National Lab., CA (United States); Schalk, W.W.; Nasstrom, J.S. [EG and G, Inc., Pleasanton, CA (United States)

    1992-06-25

    During the recent (12--22 June 1991) Mount Pinatubo volcano eruptions, the US Air Force Global Weather Central (AFGWC) requested assistance of the US Department of Energy`s Atmospheric Release Advisory Capability (ARAC) in creating volcanic ash cloud aviation advisories for the region of the Philippine Islands. Through application of its three-dimensional material transport and diffusion models using AFGWC meteorological analysis and forecast wind fields ARAC developed extensive analysis and 12-hourly forecast ash cloud position advisories extending to 48 hours for a period of five days. The advisories consisted of ``relative`` ash cloud concentrations in ten layers (surface-5,000 feet, 5,000--10,000 feet and every 10,000 feet to 90,000 feet). The ash was represented as a log-normal size distribution of 10--200 {mu}m diameter solid particles. Size-dependent ``ashfall`` was simulated over time as the eruption clouds dispersed. Except for an internal experimental attempt to model one of the Mount Redoubt, Alaska, eruptions (12/89), ARAC had no prior experience in modeling volcanic eruption ash hazards. For the cataclysmic eruption of 15--16 June, the complex three-dimensional atmospheric structure of the region produced dramatically divergent ash cloud patterns. The large eruptions (> 7--10 km) produced ash plume clouds with strong westward transport over the South China Sea, Southeast Asia, India and beyond. The low-level eruptions (< 7 km) and quasi-steady-state venting produced a plume which generally dispersed to the north and east throughout the support period. Modeling the sequence of eruptions presented a unique challenge. Although the initial approach proved viable, further refinement is necessary and possible. A distinct need exists to quantify eruptions consistently such that ``relative`` ash concentrations relate to specific aviation hazard categories.

  12. Atmospheric release advisory capability

    International Nuclear Information System (INIS)

    Sullivan, T.J.

    1981-01-01

    The ARAC system (Atmospheric Release Advisory Capability) is described. The system is a collection of people, computers, computer models, topographic data and meteorological input data that together permits a calculation of, in a quasi-predictive sense, where effluent from an accident will migrate through the atmosphere, where it will be deposited on the ground, and what instantaneous and integrated dose an exposed individual would receive

  13. Between likes and shares: effects of emotional appeal and virality on the persuasiveness of anticyberbullying messages on Facebook.

    Science.gov (United States)

    Alhabash, Saleem; McAlister, Anna R; Hagerstrom, Amy; Quilliam, Elizabeth Taylor; Rifon, Nora J; Richards, Jef I

    2013-03-01

    Growth in the popularity of social networking sites (SNSs) such as Facebook has been accompanied by unintended negative results (e.g., cyberbullying). SNSs could offer solutions, as well. In this article, we explore the persuasive effects of the emotional appeal and message virality of Facebook status updates. Using status updates for a fictitious anticyberbullying organization, we conducted a 3×2×2×3 (emotional tone × affective evaluation × viral reach × message repetition) mixed factorial experiment (N=365). Positive messages resulted in more positive message evaluations and stronger anticyberbullying attitudes and viral behavioral intentions. Further, low message virality led to the most favorable message evaluations, while high virality resulted in stronger anticyberbullying attitudes.

  14. The WLCG Messaging Service and its Future

    International Nuclear Information System (INIS)

    Cons, Lionel; Paladin, Massimo

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures will support the growth of the WLCG messaging service.

  15. Hand hygiene posters: motivators or mixed messages?

    Science.gov (United States)

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-07-01

    Poster campaigns regarding hand hygiene are commonly used by infection control teams to improve practice, yet little is known of the extent to which they are based on established theory or research. This study reports on the content analysis of hand hygiene posters (N=69) and their messages (N=75) using message-framing theory. The results showed that posters seldom drew on knowledge about effective ways to frame messages. Frequently, they simply conveyed information 'telling' rather than 'selling' and some of this was confusing. Most posters were not designed to motivate, and some conveyed mixed messages. Few used fear appeals. Hand hygiene posters could have a greater impact if principles of message framing were utilized in their design. Suggestions for gain-framed messages are offered, but these need to be tested empirically.

  16. Diabetes education via mobile text messaging.

    Science.gov (United States)

    Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas

    2006-01-01

    Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.

  17. CMLOG: A common message logging system

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  18. 75 FR 22757 - Federal Advisory Committee; Army Education Advisory Committee; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ..., school curriculums, educational philosophy and objectives, program effectiveness, facilities, staff and... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Army Education Advisory... Defense gives notice that it is renewing the charter for the Army Education Advisory Committee (hereafter...

  19. 77 FR 64335 - Notification of a Public Teleconference of the Science Advisory Board; Perchlorate Advisory Panel

    Science.gov (United States)

    2012-10-19

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL--9743-2] Notification of a Public Teleconference of the Science Advisory Board; Perchlorate Advisory Panel AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The Environmental Protection Agency (EPA) Science Advisory Board (SAB) Staff Office...

  20. Application of a Tsunami Warning Message Metric to refine NOAA NWS Tsunami Warning Messages

    Science.gov (United States)

    Gregg, C. E.; Johnston, D.; Sorensen, J.; Whitmore, P.

    2013-12-01

    In 2010, the U.S. National Weather Service (NWS) funded a three year project to integrate social science into their Tsunami Program. One of three primary requirements of the grant was to make improvements to tsunami warning messages of the NWS' two Tsunami Warning Centers- the West Coast/Alaska Tsunami Warning Center (WCATWC) in Palmer, Alaska and the Pacific Tsunami Warning Center (PTWC) in Ewa Beach, Hawaii. We conducted focus group meetings with a purposive sample of local, state and Federal stakeholders and emergency managers in six states (AK, WA, OR, CA, HI and NC) and two US Territories (US Virgin Islands and American Samoa) to qualitatively asses information needs in tsunami warning messages using WCATWC tsunami messages for the March 2011 Tohoku earthquake and tsunami event. We also reviewed research literature on behavioral response to warnings to develop a tsunami warning message metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order and Formatting and Receiver Characteristics. A message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met. Using findings from this project and findings from a parallel NWS Warning Tiger Team study led by T. Nicolini, the WCATWC implemented the first of two phases of revisions to their warning messages in November 2012. A second phase of additional changes, which will fully implement the redesign of messages based on the metric, is in progress. The resulting messages will reflect current state-of-the-art knowledge on warning message effectiveness. Here we present the message metric; evidence-based rational for message factors; and examples of previous, existing and proposed messages.

  1. Message Received: Virtual Ethnography in Online Message Boards

    Directory of Open Access Journals (Sweden)

    Kevin F. Steinmetz

    2012-02-01

    Full Text Available As the Internet begins to encapsulate more people within online communities, it is important that the social researcher have well-rounded ethnographic methodologies for observing these phenomena. This article seeks to contribute to methodology by detailing and providing insights into three specific facets of virtual ethnography that need attention: space and time, identity and authenticity, and ethics. Because the Internet is a globalized and instantaneous medium where space and time collapse, identity becomes more playful, and ethics become more tenuous; understanding these aspects is crucial to the study of online social groups. A second focus of this article is to apply these notions to the study of online message boards—a frequently used medium for online communication that is frequently overlooked by methodologists.

  2. Evaluation of Sexual Communication Message Strategies

    Science.gov (United States)

    2011-01-01

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity. PMID:21599875

  3. Key technologies of the server monitor and control system based on GSM short messages

    International Nuclear Information System (INIS)

    Chen Taiwei; Zhou Zhenliu; Liu Baoxu

    2007-01-01

    The network management based on SNMP protocol cannot effectively monitor and control application-system states and key-process states on the computer server. Furthermore, it needs the administrator's longtime surveillance. When the administrator leaves the computer, he can't receive the malfunction message in time. In this paper we present a server monitor and control system based on monitor agents and GSM short messages, introduce the key technology to realize it, and implement a model system in the real network environment. (authors)

  4. Joint Advisory Appeals Board

    CERN Multimedia

    2013-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a former member of the personnel, a beneficiary of the CERN Pension Fund, against the calculation of his pension in the framework of the Progressive Retirement Programme.   The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the attention of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be available from 26 July to 11 August 2013 at the following link. HR Department Head Office

  5. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Luc Vos with regard to advancement. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 14 to 28 June 2002. Human Resources Division Tel. 74128

  6. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel against the decision to grant him only a periodic one-step advancement for the 2006 reference year. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the attention of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main building (bldg. 500) from 1 September to 14 September 2008. Human Resources Department (73911)

  7. Joint Advisory Appeals Board

    CERN Multimedia

    2003-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Poul Frandsen concerning his assimilation into the new career structure. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 13 to 24 January 2003. Human Resources Division Tel. 74128

  8. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Personnel Division

    1999-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Joào Bento with regard to residential category. As the appellant has not objected, the recommendations of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article RÊVIÊ1.20 of the Staff Regulations.The relevant documents will therefore be posted on the notice boards of the Administration Building (N¡ 60) from 29 October to 12 November 1999.Personnel DivisionTel. 74128

  9. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2006-01-01

    The Joint Advisory Appeals Board was convened to examine an appeal lodged by a member of the personnel with regard to advancement. The person concerned has requested that the report of the Board and the final decision of the Director-General be brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (No. 60) from 24 March to 10 April 2006. Human Resources Department Tel. 74128

  10. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2007-01-01

    The Joint Advisory Appeals Board was convened to examine an internal appeal lodged by a member of the personnel with regard to the decision not to grant him an indefinite contract. The person concerned has requested that the report of the Board and the final decision of the Director-General be brought to the notice of the members of the personnel, in accordance with Article R VI 1.18 of the Staff Regulations. The relevant documents will therefore be posted on the notice board of the Main building (Bldg. 60) from 24 September to 7 October 2007. Human Resources Department

  11. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Olivier Francis Martin with regard to indefinite contract. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 8 to 25 June 2001.

  12. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Jack Blanchard with regard to 'non recognition of specific functions'. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 12th to 26th April 2002. Human Resources Division Tel. 74128

  13. Joint Advisory Appeals Board

    CERN Multimedia

    2003-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mrs Judith Igo-Kemenes concerning the application of procedures foreseen by Administrative Circular N§ 26 (Rev. 3). As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 6 to 20 June 2003. Human Resources Division Tel. 74128

  14. Joint Advisory Appeals Board

    CERN Multimedia

    2004-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mrs Maria DIMOU with regard to a periodic one-step increase. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 30 April to 14 May 2004. Human Resources Department Tel. 74128

  15. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Joël Lahaye with regard to non-resident allowance. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 18 May to 1st June 2001.

  16. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel with regard to the decision not to award him a periodic one-step advancement for the 2006 reference year. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the notice of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main building (Bldg. 500) from 17 March to 30 March 2008. Human Resources Department Tel. 73911

  17. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Bertrand Nicquevert with regard to the non-resident allowance. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 29 November to 13 December 2002. Human Resources Division Tel. 74128

  18. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Antonio Millich with regard to advancement. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 27 September to 11 October 2002. Human Resources Division Tel. 74128

  19. Joint Advisory Appeals Board

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Joint Advisory Appeals Board was convened to examine an appeal lodged by a member of the personnel with regard to a periodic one-step increase. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 1 to 15 April 2005. Human Resources Department Tel. 74128

  20. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel against the decision to grant him only a periodic one-step advancement for the 2006 reference year. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the attention of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main Building (Bldg. 500) from 1 September to 14 September 2008. Human Resources Department (73911)

  1. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Gert Jan Bossen with regard to dependent child allowance. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 1st to 15 March 2002. Human Resources Division Tel. 74128

  2. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel with regard to the decision not to grant him an indefinite contract. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the notice of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main Building (Bldg. 500) from 26 May to 6 June 2008. Human Resources Department (73911)

  3. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Serge Peraire with regard to exceptional advancement. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 17 to 31 May 2002. Human Resources Division Tel. 74128

  4. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board was convened to examine an internal appeal lodged by a member of the personnel with regard to the decision not to grant him an indefinite contract. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the notice of the members of the personnel, in accordance with Article R VI 1.18 of the Staff Regulations. These documents will therefore be posted on the notice board of the Main Building (Bldg. 60) from 21 January to 3 February 2008. Human Resources Department (73911)

  5. Joint Advisory Appeals Board

    CERN Multimedia

    2003-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Aloïs Girardoz with regard to classification and advancement. As the appellant has not objected, the Board's report and the Director-General's decision will be brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 15 to 29 August 2003. Human Resources Division Tel. 74128

  6. Expectancy Theory in Media and Message Selection.

    Science.gov (United States)

    Van Leuven, Jim

    1981-01-01

    Argues for reversing emphasis on uses and gratifications research in favor of an expectancy model which holds that selection of a particular medium depends on (1) the expectation that the choice will be followed by a message of interest and (2) the importance of that message in satisfying user's values. (PD)

  7. Should We Ban Instant Messaging In School?

    Science.gov (United States)

    Texley, Sharon; DeGennaro, Donna

    2005-01-01

    This article is a brief debate on the pros and cons of allowing students to use instant messaging (IM) in school. On one hand, teenagers' desire to socialize can overcome other priorities and schools may set policies to ban instant messaging. The contrary view is that schools should embrace the IM technology being popularized by youth and find…

  8. 78 FR 64202 - Quantitative Messaging Research

    Science.gov (United States)

    2013-10-28

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast- track OMB approval... comments. Please submit your comments using only one method and identify that it is for the ``Quantitative...

  9. Undergraduates' Text Messaging Language and Literacy Skills

    Science.gov (United States)

    Grace, Abbie; Kemp, Nenagh; Martin, Frances Heritage; Parrila, Rauno

    2014-01-01

    Research investigating whether people's literacy skill is being affected by the use of text messaging language has produced largely positive results for children, but mixed results for adults. We asked 150 undergraduate university students in Western Canada and 86 in South Eastern Australia to supply naturalistic text messages and to complete…

  10. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  11. Messages about Sexuality: An Ecological Perspective

    Science.gov (United States)

    Boone, Tanya L.

    2015-01-01

    The goal of this two-part study was to identify the perceived influence of sexuality messages from parents, peers, school and the media--four microsystems within the Ecological Model--on emerging adult US college women's sexual attitudes. Findings suggest that parents were the most likely source of the message to "remain abstinent until…

  12. Suspecting Neurological Dysfunction From E Mail Messages ...

    African Journals Online (AJOL)

    A non medical person suspected and confirmed neurological dysfunction in an individual, based only on e mail messages sent by the individual. With email communication becoming rampant “peculiar” email messages may raise the suspicion of neurological dysfunction. Organic pathology explaining the abnormal email ...

  13. The WLCG Messaging Service and its Future

    CERN Document Server

    Cons, Lionel

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures wil...

  14. Hand hygiene posters: selling the message.

    Science.gov (United States)

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-02-01

    This literature review was undertaken to determine the established theory and research that might be utilized to inform the construction of persuasive messages on hand hygiene posters. It discusses the principles of message framing and the use of fear appeals. Current theory suggests that the most effective messages for health promotion behaviours should be framed in terms of gains rather than losses for the individual. However, as clinical hand hygiene is largely for the benefit of others (i.e. patients), messages should also invoke a sense of personal responsibility and appeal to altruistic behaviour. The use of repeated minimal fear appeals have their place. Posters that simply convey training messages are not effective persuaders.

  15. Designing Anti-Binge Drinking Prevention Messages: Message Framing vs. Evidence Type.

    Science.gov (United States)

    Kang, Hannah; Lee, Moon J

    2017-09-27

    We investigated whether presenting anti-binge drinking health campaign messages in different message framing and evidence types influences college students' intention to avoid binge drinking, based on prospect theory (PT) and exemplification theory. A 2 (message framing: loss-framed message/gain-framed message) X 2 (evidence type: statistical/narrative) between-subjects factorial design with a control group was conducted with 156 college students. College students who were exposed to the loss-framed message condition exhibited a higher level of intention to avoid binge drinking in the near future than those who did not see any messages (the control group). This finding was mainly among non-binge drinkers. Regardless of evidence type, those who were exposed to the messages exhibited a higher level of intention to avoid binge drinking than those in the control group. This is also mainly among non-binge drinkers. We also found the main effects of message framing and evidence type on attitude toward the message and the main effect of message framing on attitude toward drinking.

  16. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs

    Directory of Open Access Journals (Sweden)

    Haowen Tan

    2018-01-01

    Full Text Available As a crucial component of Internet-of-Thing (IoT, vehicular ad hoc networks (VANETs have attracted increasing attentions from both academia and industry fields in recent years. With the extensive VANETs deployment in transportation systems of more and more countries, drivers’ driving experience can be drastically improved. In this case, the real-time road information needs to be disseminated to the correlated vehicles. However, due to inherent wireless communicating characteristics of VANETs, authentication and group key management strategies are indispensable for security assurance. Furthermore, effective road message dissemination mechanism is of significance. In this paper, we address the above problems by developing a certificateless authentication and road message dissemination protocol. In our design, certificateless signature and the relevant feedback mechanism are adopted for authentication and group key distribution. Subsequently, message evaluating and ranking strategy is introduced. Security analysis shows that our protocol achieves desirable security properties. Additionally, performance analysis demonstrates that the proposed protocol is efficient compared with the state of the art.

  17. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    Science.gov (United States)

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  18. KZHU Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  19. KZOA Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  20. KZJX Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  1. KZBW Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  2. KZFW Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  3. KZSE Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  4. KZME Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  5. KZDV Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  6. KZNY Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  7. KZDC Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  8. KZAU Center Weather Advisory (CWA)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The CWA is an aviation weather warning for conditions meeting or approaching national in-flight advisory (AIRMET, SIGMET or SIGMET for convection) criteria. CWAs are...

  9. Crash course in readers' advisory

    CERN Document Server

    Orr, Cynthia

    2014-01-01

    One of the key services librarians provide is helping readers find books they'll enjoy. This ""crash course"" will furnish you with the basic, practical information you need to excel at readers' advisory (RA) for adults and teens.

  10. Text messages as a learning tool for midwives | Woods | South ...

    African Journals Online (AJOL)

    The use of cell phone text messaging to improve access to continuing ... with 50 of the message recipients, demonstrated that the text messages were well received by ... services, such as the management of HIV-infected children and adults.

  11. A Message Without a Code?

    Directory of Open Access Journals (Sweden)

    Tom Conley

    1981-01-01

    Full Text Available The photographic paradox is said to be that of a message without a code, a communication lacking a relay or gap essential to the process of communication. Tracing the recurrence of Barthes's definition in the essays included in Image/Music/Text and in La Chambre claire , this paper argues that Barthes's definition is platonic in its will to dematerialize the troubling — graphic — immediacy of the photograph. He writes of the image in order to flee its signature. As a function of media, his categories are written in order to be insufficient and inadequate; to maintain an ineluctable difference between language heard and letters seen; to protect an idiom of loss which the photograph disallows. The article studies the strategies of his definition in «The Photographic Paradox» as instrument of abstraction, opposes the notion of code, in an aural sense, to audio-visual markers of closed relay in advertising, and critiques the layout and order of La Chambre claire in respect to Barthes's ideology of absence.

  12. 76 FR 29752 - The President's Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting

    Science.gov (United States)

    2011-05-23

    ... Management, for the purpose of identifying leading business practices that have the potential to improve...'s Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting AGENCY: Office...: The President's Management Advisory Board, a Federal Advisory Committee established in accordance with...

  13. 76 FR 52016 - NASA International Space Station Advisory Committee and the Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2011-08-19

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-074)] NASA International Space Station Advisory Committee and the Aerospace Safety Advisory Panel; Meeting AGENCY: National Aeronautics and Space... meeting of the NASA International Space Station Advisory Committee and the Aerospace Safety Advisory Panel...

  14. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  15. Evaluation of Sexual Communication Message Strategies

    Directory of Open Access Journals (Sweden)

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  16. Network coding for multi-resolution multicast

    DEFF Research Database (Denmark)

    2013-01-01

    A method, apparatus and computer program product for utilizing network coding for multi-resolution multicast is presented. A network source partitions source content into a base layer and one or more refinement layers. The network source receives a respective one or more push-back messages from one...... or more network destination receivers, the push-back messages identifying the one or more refinement layers suited for each one of the one or more network destination receivers. The network source computes a network code involving the base layer and the one or more refinement layers for at least one...... of the one or more network destination receivers, and transmits the network code to the one or more network destination receivers in accordance with the push-back messages....

  17. When message-frame fits salient cultural-frame, messages feel more persuasive.

    Science.gov (United States)

    Uskul, Ayse K; Oyserman, Daphna

    2010-03-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a message about health risks of caffeine consumption among individuals prescreened to be regular caffeine consumers. After being primed for individualism, European Americans who read a health message that focused on the personal self were more likely to accept the message-they found it more persuasive, believed they were more at risk and engaged in more message-congruent behaviour. These effects were also found among Asian Americans who were primed for collectivism and who read a health message that focused on relational obligations. The findings point to the importance of investigating the role of situational cues in persuasive effects of health messages and suggest that matching content to primed frame consistent with the chronic frame may be a way to know what to match messages to.

  18. Developing religiously-tailored health messages for behavioral change: Introducing the reframe, reprioritize, and reform ("3R") model.

    Science.gov (United States)

    Padela, Aasim I; Malik, Sana; Vu, Milkie; Quinn, Michael; Peek, Monica

    2018-05-01

    As community health interventions advance from being faith-placed to authentically faith-based, greater discussion is needed about the theory, practice, and ethics of delivering health messages embedded within a religious worldview. While there is much potential to leverage religion to promote health behaviors and improve health outcomes, there is also a risk of co-opting religious teachings for strictly biomedical ends. To describe the development, implementation, and ethical dimensions of a conceptual model for religiously-tailoring health messages. We used data from 6 focus groups and 19 interviews with women aged 40 and older sampled from diverse Muslim community organizations to map out how religious beliefs and values impact mammography-related behavioral, normative and control beliefs. These beliefs were further grouped into those that enhance mammography intention (facilitators) and those that impede intention (barriers). In concert with a multi-disciplinary advisory board, and by drawing upon leading theories of health behavior change, we developed the "3R" model for crafting religiously-tailored health messages. The 3R model addresses barrier beliefs, which are beliefs that negatively impact adopting a health behavior, by (i) reframing the belief within a relevant religious worldview, (ii) reprioritizing the belief by introducing another religious belief that has greater resonance with participants, and (iii) reforming the belief by uncovering logical flaws and/or theological misinterpretations. These approaches were used to create messages for a peer-led, mosque-based, educational intervention designed to improve mammography intention among Muslim women. There are benefits and potential ethical challenges to using religiously tailored messages to promote health behaviors. Our theoretically driven 3R model aids interventionists in crafting messages that address beliefs that hinder healthy behaviors. It is particularly useful in the context of faith

  19. Comment ameliorer la selection et le traitement des messages verbaux? (How to Improve the Selection and Processing of Verbal Messages)

    National Research Council Canada - National Science Library

    Rivenez, Marie; Darwin, Chris; Guillaume, Anne

    2005-01-01

    L'objectif de cette recherche est d'ameliorer la selection des messages verbaux. Nous cherchons a determiner les facteurs influencant le traitement d'un message verbal lorsque l'attention est portee sur un autre message...

  20. "Pervy Role-Play and Such": Girls' Experiences of Sexual Messaging Online

    Science.gov (United States)

    Nielsen, Silja; Paasonen, Susanna; Spisak, Sanna

    2015-01-01

    Sexting is one of the recurring causes of concern in public discussion of young people and network media. This paper builds on findings from a survey with 1269 Finnish female respondents aged 11-18 conducted using a popular online community for girls on their experiences of and views on online messages concerning sex and sexuality. Sixty-five per…

  1. Computer Conferencing and Electronic Messaging. Conference Proceedings (Guelph, Ontario, Canada, January 22-23, 1985).

    Science.gov (United States)

    Guelph Univ. (Ontario).

    This 21-paper collection examines various issues in electronic networking and conferencing with computers, including design issues, conferencing in education, electronic messaging, computer conferencing applications, social issues of computer conferencing, and distributed computer conferencing. In addition to a keynote address, "Computer…

  2. Constant Companions: Instant Messaging Conversations as Sustainable Supportive Study Structures amongst Undergraduate Peers

    Science.gov (United States)

    Timmis, Sue

    2012-01-01

    Universities are facing severe cuts in funding and a transformation of both the economic model underpinning higher education and the relationship between students, tutors and universities and the traditional forms of support for students' learning may be eroded. At the same time, mobile communications, instant messaging and social networking are…

  3. 77 FR 43064 - Meeting; Technology Advisory Committee

    Science.gov (United States)

    2012-07-23

    ... customer fund segregation laws, and making false statements in financial statements filed with the... COMMODITY FUTURES TRADING COMMISSION Meeting; Technology Advisory Committee AGENCY: Commodity Futures Trading Commission (CFTC). ACTION: Notice of emergency meeting of technology advisory committee...

  4. Advisory and autonomous cooperative driving systems

    NARCIS (Netherlands)

    Broek, T.H.A. van den; Ploeg, J.; Netten, B.D.

    2011-01-01

    In this paper, the traffic efficiency of an advisory cooperative driving system, Advisory Acceleration Control is examined and compared to the efficiency of an autonomous cooperative driving system, Cooperative Adaptive Cruise Control. The algorithms and implementation thereof are explained. The

  5. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Neil Calder, Mrs Sudeshna Datta Cockerill, Mrs Andrée Fontbonne, Mrs Moniek Laurent and Mr Ulrich Liptow with regard to membership in the Pension Fund under the period with a Paid Associate contract, appeals dealt with on a collective basis. As the appellants have not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 10 to 31 August 2001.

  6. Atmospheric Release Advisory Capability

    International Nuclear Information System (INIS)

    Dickerson, M.H.; Gudiksen, P.H.; Sullivan, T.J.

    1983-02-01

    The Atmospheric Release Advisory Capability (ARAC) project is a Department of Energy (DOE) sponsored real-time emergency response service available for use by both federal and state agencies in case of a potential or actual atmospheric release of nuclear material. The project, initiated in 1972, is currently evolving from the research and development phase to full operation. Plans are underway to expand the existing capability to continuous operation by 1984 and to establish a National ARAC Center (NARAC) by 1988. This report describes the ARAC system, its utilization during the past two years, and plans for its expansion during the next five to six years. An integral part of this expansion is due to a very important and crucial effort sponsored by the Defense Nuclear Agency to extend the ARAC service to approximately 45 Department of Defense (DOD) sites throughout the continental US over the next three years

  7. An efficient communication scheme for solving Sn equations on message-passing multiprocessors

    International Nuclear Information System (INIS)

    Azmy, Y.Y.

    1993-01-01

    Early models of Intel's hypercube multiprocessors, e.g., the iPSC/1 and iPSC/2, were characterized by the high latency of message passing. This relatively weak dependence of the communication penalty on the size of messages, in contrast to its strong dependence on the number of messages, justified using the Fan-in Fan-out algorithm (which implements a minimum spanning tree path) to perform global operations, such as global sums, etc. Recent models of message-passing computers, such as the iPSC/860 and the Paragon, have been found to possess much smaller latency, thus forcing a reexamination of the issue of performance optimization with respect to communication schemes. Essentially, the Fan-in Fan-out scheme minimizes the number of nonsimultaneous messages sent but not the volume of data traffic across the network. Furthermore, if a global operation is performed in conjunction with the message passing, a large fraction of the attached nodes remains idle as the number of utilized processors is halved in each step of the process. On the other hand, the Recursive Halving scheme offers the smallest communication cost for global operations but has some drawbacks

  8. Instant Messaging for Creating Interactive and Collaborative m-Learning Environments

    Directory of Open Access Journals (Sweden)

    James Kadirire

    2007-06-01

    Full Text Available 'Instant Messaging' (IM and 'Presence,' which is essentially the ability of being able to detect if other users are logged in on the network and send them messages in real time, has become one of the most popular applications of the Internet, causing people to want to stay connected to the Internet for inordinate amounts of time, a phenomena that also fosters a sense of "online community," that perhaps no other application has done previously (Alvestrand, 2002. This research looks at the use of mobile devices to send instant messages that can carry much more information than the short message service (SMS messages, but would be free to use, notwithstanding the price of getting online. We present a prototype IM system that can be used as a viable means of communicating and learning in higher education establishments. There is some evidence to show that learning using mobile devices reduces the formality of the learning experience, and helps engage reluctant learners and raise their self-confidence. In order for the learning process to be successful in online distance learning, unlike in the traditional face-to-face learning, attention must be paid to developing the participants' sense of community within their particular group. Instant messaging – or IM – is a natural medium for online community building and asynchronous/ synchronous peer discussions.

  9. Message passing for quantified Boolean formulas

    International Nuclear Information System (INIS)

    Zhang, Pan; Ramezanpour, Abolfazl; Zecchina, Riccardo; Zdeborová, Lenka

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis–Putnam–Logemann–Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics give robust exponential efficiency gain with respect to state-of-the-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this, our study sheds light on using message passing in small systems and as subroutines in complete solvers

  10. Anxiety, Construct Differentiation, and Message Production.

    Science.gov (United States)

    Shepherd, Gregory J.; Condra, Mollie B.

    1989-01-01

    Examines the nature of the construct differentiation/anxiety relationship in light of messages produced. Considers recent and complex conceptualizations of social-cognitive development and anxiety. Finds no significant relationship between state anxiety and construct differentiation. (MM)

  11. MORPHOLOGICAL STRATEGIES IN TEXT MESSAGING AMONG ...

    African Journals Online (AJOL)

    Text messaging is the application of abridged morphological forms in order ... the emergence of the Global System for Mobile Communication (GSM) in the world. ... Our thesis statement is that these morphological patterns as used in SMS are ...

  12. Photometric requirements for portable changeable message signs.

    Science.gov (United States)

    2001-09-01

    This project reviewed the performance of pchangeable message signs (PCMSs) and developed photometric standards to establish performance requirements. In addition, researchers developed photometric test methods and recommended them for use in evaluati...

  13. Wyoming CV Pilot Traveler Information Message Sample

    Data.gov (United States)

    Department of Transportation — This dataset contains a sample of the sanitized Traveler Information Messages (TIM) being generated by the Wyoming Connected Vehicle (CV) Pilot. The full set of TIMs...

  14. Getting the message across: age differences in the positive and negative framing of health care messages.

    Science.gov (United States)

    Shamaskin, Andrea M; Mikels, Joseph A; Reed, Andrew E

    2010-09-01

    Although valenced health care messages influence impressions, memory, and behavior (Levin, Schneider, & Gaeth, 1998) and the processing of valenced information changes with age (Carstensen & Mikels, 2005), these 2 lines of research have thus far been disconnected. This study examined impressions of, and memory for, positively and negatively framed health care messages that were presented in pamphlets to 25 older adults and 24 younger adults. Older adults relative to younger adults rated positive pamphlets more informative than negative pamphlets and remembered a higher proportion of positive to negative messages. However, older adults misremembered negative messages to be positive. These findings demonstrate the age-related positivity effect in health care messages with promise as to the persuasive nature and lingering effects of positive messages. (c) 2010 APA, all rights reserved.

  15. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  16. 5 CFR 724.403 - Advisory guidelines.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Advisory guidelines. 724.403 Section 724.403 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS... RETALIATION ACT OF 2002 Best Practices § 724.403 Advisory guidelines. OPM will issue advisory guidelines to...

  17. Advisory Board on Alcoholism and Drug Abuse

    Science.gov (United States)

    State Employees Advisory Board on Alcoholism and Drug Abuse DHSS State of Alaska Home Divisions and ; Advisory Board on Alcoholism and Drug Abuse Page Content Alison Kulas Executive Director If you, a family Kulas Begins Tenure as Executive Director The Advisory Board on Alcoholism and Drug Abuse, The Alaska

  18. 78 FR 40487 - National Infrastructure Advisory Council

    Science.gov (United States)

    2013-07-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0033] National Infrastructure Advisory... an open Federal Advisory Committee Meeting. SUMMARY: The National Infrastructure Advisory Council..., from 1:30 p.m. to 4:30 p.m. The meeting may close early if the committee has completed its business...

  19. 77 FR 19300 - National Infrastructure Advisory Council

    Science.gov (United States)

    2012-03-30

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0012] National Infrastructure Advisory... an open Federal Advisory Committee meeting. SUMMARY: The National Infrastructure Advisory Council... business. For additional information, please consult the NIAC Web site, www.dhs.gov/NIAC , or contact the...

  20. Message-driven factors influencing opening and forwarding of mobile advertising messages

    OpenAIRE

    Sanz Blas, Silvia; Ruiz Mafé, Carla; Martí Parreño, José

    2015-01-01

    This work aims to analyse the influence of message-driven factors -informativeness, ubiquity, frequency and personalization- on consumer attitude and behaviour -opening and forwarding- towards mobile advertising messages. A theoretical model was developed and empirically tested using a sample of 355 Spanish teenager mobile users. Findings show that frequency is the dimension accounting the most -and significantly- of the four message-driven factors analysed on attitude toward mobile advertisi...

  1. When message-frame fits salient cultural-frame, messages feel more persuasive

    OpenAIRE

    Uskul, Ayse K.; Oyserman, Daphna

    2010-01-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a me...

  2. Persuasive messages. Development of persuasive messages may help increase mothers' compliance of their children's immunization schedule.

    Science.gov (United States)

    Gore, P; Madhavan, S; Curry, D; McClurg, G; Castiglia, M; Rosenbluth, S A; Smego, R A

    1998-01-01

    Effective immunization campaigns can be designed by determining which persuasion strategy is most effective in attracting the attention of mothers of preschoolers. The authors assess the impact of three persuasional strategies: fear-arousal, motherhood-arousal, and rational messages, on mothers of preschoolers who are late for their immunizations. The fear-arousal message was found to be most effective, followed by the motherhood-arousal, and then the rational message, in attracting mothers' attention to their child's immunization status.

  3. Improving Type Error Messages in OCaml

    Directory of Open Access Journals (Sweden)

    Arthur Charguéraud

    2015-12-01

    Full Text Available Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise and systematically useful to the programmer, but also to handle a full-blown programming language and to cope with large-sized programs efficiently. In this work, we present a modification to the traditional ML type inference algorithm implemented in OCaml that, by significantly reducing the left-to-right bias, allows us to report error messages that are more helpful to the programmer. Our algorithm remains fully predictable and continues to produce fairly concise error messages that always help making some progress towards fixing the code. We implemented our approach as a patch to the OCaml compiler in just a few hundred lines of code. We believe that this patch should benefit not just to beginners, but also to experienced programs developing large-scale OCaml programs.

  4. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  5. Gender messages in contemporary popular Malay songs

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  6. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  7. Measures for Controlling Spam Messages%垃圾短信控制措施

    Institute of Scientific and Technical Information of China (English)

    乐炯; 陈信刚; 洪亮

    2016-01-01

    With the rapid development of Short Message Service(SMS)value-added services,spam messages repre-sented by advertising messages and fraud messages are increasing,and therefore the mobile phone user's legitimate rights and interests,as the right to tranquility in life,right to communication freedom and right to privacy,etc. are infringed. In order to effectively control the number of spam messages,the paper comprehensively analyzes spam messages types and their transmitting channels. Some control measures of spam messages,as the function of over-clocking intercept,keyword intercept,black list,white list,differentiated quality of services and SMS signature, etc. are deployed in six important network elements of the spam messages transmitting channels,such as SMS cen-ter,SMS gateway,device for mass messages,Service Provider(SP) platform,SP management platform and industry SMS platform. Through the implementation of the measures for controlling spam messages,complaints on spam messages are relatively reduced,and therefore as mobile phone user's experience improves significantly.%随着短信增值业务的快速发展,以广告短信、欺诈短信为代表的垃圾短信日益增加,手机用户的生活安宁权、通信自由权、隐私权等合法权益受到侵害。为有效控制垃圾短信数量,本文对垃圾短信种类及其发送通道进行了全面梳理分析,在短信中心、短信网关、短信群发器、SP平台、SP管理平台、行业短信平台六个垃圾短信发送通道中的重要网元上部署了超频拦截功能、关键字拦截功能、黑名单功能、白名单功能、差异化服务质量保障功能、短信签名功能等垃圾短信控制措施。通过垃圾短信控制措施的实施,垃圾短信投诉量得到较好的控制,手机用户的感知明显提升。

  8. Comparing tailored and untailored text messages for smoking cessation

    DEFF Research Database (Denmark)

    Skov-Ettrup, L S; Ringgaard, L W; Dalum, P

    2014-01-01

    The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were...... of text messages increases quit rates among young smokers....

  9. Stepwise Development a Text Messaging-Based Bullying Prevention Program for Middle School Students (BullyDown).

    Science.gov (United States)

    Ybarra, Michele L; Prescott, Tonya L; Espelage, Dorothy L

    2016-06-13

    Bullying is a significant public health issue among middle school-aged youth. Current prevention programs have only a moderate impact. Cell phone text messaging technology (mHealth) can potentially overcome existing challenges, particularly those that are structural (e.g., limited time that teachers can devote to non-educational topics). To date, the description of the development of empirically-based mHealth-delivered bullying prevention programs are lacking in the literature. To describe the development of BullyDown, a text messaging-based bullying prevention program for middle school students, guided by the Social-Emotional Learning model. We implemented five activities over a 12-month period: (1) national focus groups (n=37 youth) to gather acceptability of program components; (2) development of content; (3) a national Content Advisory Team (n=9 youth) to confirm content tone; and (4) an internal team test of software functionality followed by a beta test (n=22 youth) to confirm the enrollment protocol and the feasibility and acceptability of the program. Recruitment experiences suggested that Facebook advertising was less efficient than using a recruitment firm to recruit youth nationally, and recruiting within schools for the pilot test was feasible. Feedback from the Content Advisory Team suggests a preference for 2-4 brief text messages per day. Beta test findings suggest that BullyDown is both feasible and acceptable: 100% of youth completed the follow-up survey, 86% of whom liked the program. Text messaging appears to be a feasible and acceptable delivery method for bullying prevention programming delivered to middle school students.

  10. Art messaging to engage homeless young adults.

    Science.gov (United States)

    Nyamathi, Adeline; Slagle, Alexandra; Thomas, Alexandra; Hudson, Angela; Kahilifard, Farinaz; Avila, Glenna; Orser, Julie; Cuchilla, Manuel

    2011-01-01

    Art has been shown to be an empowering and engaging entity with numerous benefits to vulnerable populations, including the homeless persons and young adults. However, little is known how homeless young adults perceive the use of art as messages that can communicate the danger of initiating or continuing drug and alcohol use. The purpose of this study was to solicit perspectives of homeless, drug-using young adults as to how art can be used to design messages for their peers about the danger of initiating or continuing drug and alcohol use. Qualitative methodology via focus group discussions was utilized to engage 24 homeless young adults enrolled from a drop-in site in Santa Monica, California. The findings revealed support for a myriad of delivery styles, including in-person communication, flyers, music, documentary film, and creative writing. The young adults also provided insight into the importance of the thematic framework of messages. Such themes ranged from empowering and hopeful messages to those designed to scare young homeless adults into not experimenting with drugs. The findings indicate that in addition to messages communicating the need to prevent or reduce drug and alcohol use, homeless young adults respond to messages that remind them of goals and dreams they once had for their future, and to content that is personal, real, and truthful. Our research indicates that messages that reinforce protective factors such as hope for the future and self-esteem may be as important to homeless young adults as information about the risks and consequences of drug use.

  11. [The Editorial Advisory Committee].

    Science.gov (United States)

    Reyes, H

    1996-12-01

    Since 1970, Revista Médica de Chile applies the peer review system as a main step in the selection and improvement of the manuscripts to be published. Over 150 experts participate in this process annually, reviewing up to 5 manuscripts per year. The final decision with regards to to the acceptability of a manuscript remains a responsibility of the Editor. The reviewers are selected by the Editor and his Associates among clinical investigators, prominent subspecialits and basic scientists, according to the nature of the manuscript. Most of them work in Chile. Their names are published and their confidential work is acknowledged in a special chronicle published in the Revista once a year. A small number of these reviewers appears in every issue of the journal identified as Members of its Editorial Advisory Committee. They have been selected by the Editors among those reviewers who deal with a greater number of manuscripts and also those experienced specialists whose opinion is requested when an exceptional conflict of opinions is raised by the authors and their reviewers. After 5 to 10 years of a highly praised collaboration, the previous Committee has been changed and new names were included, starting in this issue of Revista Médica de Chile.

  12. 78 FR 45544 - Advisory Committee for Women's Services; Notice of Meeting

    Science.gov (United States)

    2013-07-29

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Substance Abuse and Mental Health Services Administration... given of a meeting of the Substance Abuse and Mental Health Services Administration's (SAMHSA) Advisory... Health Reform with a Focus on Women's Services, NASADAD Women's Services Network (WSN), The Women's...

  13. Emotional flow in persuasive health messages.

    Science.gov (United States)

    Nabi, Robin L

    2015-01-01

    Overwhelmingly, the literature on the persuasive influence of emotions has focused on individual emotions, fear in particular, though some recent attention has been given to mixed emotions in persuasive appeals. Building on this newer wave of research, this article argues that instead of focusing on singular emotional states or collections of emotions evoked by a message, it might prove valuable to explore the flow, or evolution, of emotional experience over the course of exposure to a health message. The article offers a brief introduction to the concept of emotion, followed by a review of the state of the literature on the use of emotion in health messages. The concept of emotional flow is then introduced along with a consideration of how it has been tacitly incorporated into the study of emotional health messages. Finally, the utility of the concept of emotional flow is elaborated by articulating the ways in which it might be harnessed to facilitate the creation of more effective health messages, individually as well as across campaigns. The article concludes with an agenda for future research.

  14. Effects of Electronic Word - of - Mouth Messages

    Directory of Open Access Journals (Sweden)

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.

  15. Supervising simulations with the Prodiguer Messaging Platform

    Science.gov (United States)

    Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien

    2015-04-01

    At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.

  16. Positive messaging promotes walking in older adults.

    Science.gov (United States)

    Notthoff, Nanna; Carstensen, Laura L

    2014-06-01

    Walking is among the most cost-effective and accessible means of exercise. Mounting evidence suggests that walking may help to maintain physical and cognitive independence in old age by preventing a variety of health problems. However, older Americans fall far short of meeting the daily recommendations for walking. In 2 studies, we examined whether considering older adults' preferential attention to positive information may effectively enhance interventions aimed at promoting walking. In Study 1, we compared the effectiveness of positive, negative, and neutral messages to encourage walking (as measured with pedometers). Older adults who were informed about the benefits of walking walked more than those who were informed about the negative consequences of failing to walk, whereas younger adults were unaffected by framing valence. In Study 2, we examined within-person change in walking in older adults in response to positively- or negatively-framed messages over a 28-day period. Once again, positively-framed messages more effectively promoted walking than negatively-framed messages, and the effect was sustained across the intervention period. Together, these studies suggest that consideration of age-related changes in preferences for positive and negative information may inform the design of effective interventions to promote healthy lifestyles. Future research is needed to examine the mechanisms underlying the greater effectiveness of positively- as opposed to negatively-framed messages and the generalizability of findings to other intervention targets and other subpopulations of older adults. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  17. Maintenance of family networks

    DEFF Research Database (Denmark)

    marsico, giuseppina; Chaudhary, N; Valsiner, Jaan

    2015-01-01

    Families are social units that expand in time (across generations) and space (as a geographically distributed sub-structures of wider kinship networks). Understanding of intergenerational family relations thus requires conceptualization of communication processes that take place within a small...... collective of persons linked with one another by a flexible social network. Within such networks, Peripheral Communication Patterns set the stage for direct everyday life activities within the family context. Peripheral Communication Patterns are conditions where one family network member (A) communicates...... manifestly with another member (B) with the aim of bringing the communicative message to the third member (C) who is present but is not explicitly designated as the manifest addressee of the intended message. Inclusion of physically non-present members of the family network (elders living elsewhere, deceased...

  18. The Defense Messaging System (DMS) in the Navy Regional Enterprise Messaging System (NREMS) environment evidence that size does matter in DoD business process engineering

    OpenAIRE

    Ramsey, Avonna S.

    2007-01-01

    Since the migration of DOD messaging to the DMS has been mandated, implementation has been less than ideal and otherwise unsuccessful. DMS users have reported dissatisfaction with the systems maintenance and security support burdens in the current client-server model. NREMS introduces a networked environment capable of push technology and centralized database and security management which should significantly reduce the DMS shortfalls that have made the system lack appeal to the end user. As ...

  19. The message development tool: a case for effective operationalization of messaging in social marketing practice.

    Science.gov (United States)

    Mattson, Marifran; Basu, Ambar

    2010-07-01

    That messages are essential, if not the most critical component of any communicative process, seems like an obvious claim. More so when the communication is about health--one of the most vital and elemental of human experiences (Babrow & Mattson, 2003). Any communication campaign that aims to change a target audience's health behaviors needs to centralize messages. Even though messaging strategies are an essential component of social marketing and are a widely used campaign model, health campaigns based on this framework have not always been able to effectively operationalize this key component, leading to cases where initiating and sustaining prescribed health behavior has been difficult (MacStravic, 2000). Based on an examination of the VERB campaign and an Australian breastfeeding promotion campaign, we propose a message development tool within the ambit of the social marketing framework that aims to extend the framework and ensure that the messaging component of the model is contextualized at the core of planning, implementation, and evaluation efforts.

  20. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  1. Earthquake Early Warning: User Education and Designing Effective Messages

    Science.gov (United States)

    Burkett, E. R.; Sellnow, D. D.; Jones, L.; Sellnow, T. L.

    2014-12-01

    The U.S. Geological Survey (USGS) and partners are transitioning from test-user trials of a demonstration earthquake early warning system (ShakeAlert) to deciding and preparing how to implement the release of earthquake early warning information, alert messages, and products to the public and other stakeholders. An earthquake early warning system uses seismic station networks to rapidly gather information about an occurring earthquake and send notifications to user devices ahead of the arrival of potentially damaging ground shaking at their locations. Earthquake early warning alerts can thereby allow time for actions to protect lives and property before arrival of damaging shaking, if users are properly educated on how to use and react to such notifications. A collaboration team of risk communications researchers and earth scientists is researching the effectiveness of a chosen subset of potential earthquake early warning interface designs and messages, which could be displayed on a device such as a smartphone. Preliminary results indicate, for instance, that users prefer alerts that include 1) a map to relate their location to the earthquake and 2) instructions for what to do in response to the expected level of shaking. A number of important factors must be considered to design a message that will promote appropriate self-protective behavior. While users prefer to see a map, how much information can be processed in limited time? Are graphical representations of wavefronts helpful or confusing? The most important factor to promote a helpful response is the predicted earthquake intensity, or how strong the expected shaking will be at the user's location. Unlike Japanese users of early warning, few Californians are familiar with the earthquake intensity scale, so we are exploring how differentiating instructions between intensity levels (e.g., "Be aware" for lower shaking levels and "Drop, cover, hold on" at high levels) can be paired with self-directed supplemental

  2. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

    CERN Document Server

    Sliwinski, W; Dworak, A

    2014-01-01

    Nowadays, all major infrastructures and data centres (commercial and scientific) make an extensive use of the publish-subscribe messaging paradigm, which helps to decouple the message sender (publisher) from the message receiver (consumer). This paradigm is also heavily used in the CERN Accelerator Control system, in Proxy broker - critical part of the Controls Middleware (CMW) project. Proxy provides the aforementioned publish-subscribe facility and also supports execution of synchronous read and write operations. Moreover, it enables service scalability and dramatically reduces the network resources and overhead (CPU and memory) on publisher machine, required to serve all subscriptions. Proxy was developed in modern C++, using state of the art programming techniques (e.g. Boost) and following recommended software patterns for achieving low-latency and high concurrency. The outstanding performance of the Proxy infrastructure was confirmed during the last 3 years by delivering the high volume of LHC equipment...

  3. EDITORIAL: Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2009-01-01

    Fusion is based on high quality full length articles. However, in the words of the journal home page, `Nuclear Fusion welcomes Letters as a means to quickly communicate new, maybe preliminary, results which make a significant advancement of the knowledge in the field. Letters should be comprehensive and short, aiming for four printed pages including figures.' I would like to take the opportunity to reiterate this message and to say that, as Editor, I would welcome the submission of high quality Letters. Publishing procedures In-house, Nuclear Fusion's publishing procedures are subject to continuous scrutiny for potential improvements. Of particular note from 2008 are faster than ever peer review and publishing times that have been achieved despite the very rigorous processing to which submissions are subject. Readers may have noticed the implementation of the new article numbering system, announced by the Publisher, Yasmin McGlashan in 2008 Nucl. Fusion 48 010101. This new scheme gives us more flexibilty and has led to faster online publication. The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria, Katja, Sophy, Sarah, Rachael and Yasmin for the support that they have given to me, the authors and the referees. Season's Greetings I would like to wish our readers, authors, referees and Board of Editors a successful and happy 2009 and thank them for their contributions to Nuclear Fusion in 2008.

  4. 77 FR 19740 - Biological Sciences Advisory Committee; Notice of Meeting

    Science.gov (United States)

    2012-04-02

    ... NATIONAL SCIENCE FOUNDATION Biological Sciences Advisory Committee; Notice of Meeting In accordance with the Federal Advisory Committee Act (Pub. L., 92- 463, as amended), the National Science Foundation announces the following meeting: Name: Biological Sciences Advisory Committee ( 1110). Date and...

  5. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-05-27

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs... Security Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will... telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee Act (FACA), Public...

  6. 78 FR 68887 - Dodd-Frank Investor Advisory Committee; Meeting

    Science.gov (United States)

    2013-11-15

    ... Investor Advisory Committee; Meeting AGENCY: Securities and Exchange Commission. ACTION: Notice of Meeting of Securities and Exchange Commission Dodd- Frank Investor Advisory Committee. SUMMARY: The Securities and Exchange Commission Investor Advisory Committee, established pursuant to Section 911 of the...

  7. 75 FR 6651 - Biological and Environmental Research Advisory Committee

    Science.gov (United States)

    2010-02-10

    ... DEPARTMENT OF ENERGY Biological and Environmental Research Advisory Committee AGENCY: Department... meeting of the Biological and Environmental Research Advisory Committee (BERAC). Federal Advisory.... Department of Energy, Office of Science, Office of Biological and Environmental Research, SC-23/Germantown...

  8. 78 FR 6087 - Biological and Environmental Research Advisory Committee

    Science.gov (United States)

    2013-01-29

    ... DEPARTMENT OF ENERGY Biological and Environmental Research Advisory Committee AGENCY: Office of... the Biological and Environmental Research Advisory Committee (BERAC). The Federal Advisory Committee... Federal Officer, BERAC, U.S. Department of Energy, Office of Science, Office of Biological and...

  9. 77 FR 4028 - Biological and Environmental Research Advisory Committee

    Science.gov (United States)

    2012-01-26

    ... DEPARTMENT OF ENERGY Biological and Environmental Research Advisory Committee AGENCY: Department... meeting of the Biological and Environmental Research Advisory Committee (BERAC). The Federal Advisory.... Department of Energy, Office of Science, Office of Biological and Environmental Research, SC-23/Germantown...

  10. 76 FR 19147 - Aerospace Safety Advisory Panel; Meeting.

    Science.gov (United States)

    2011-04-06

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-030)] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announce a forthcoming meeting of the Aerospace Safety Advisory Panel.... Kathy Dakon, Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space...

  11. 76 FR 62455 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2011-10-07

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-088)] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel... Burch, Aerospace Safety Advisory Panel Administrative Officer, National Aeronautics and Space...

  12. 78 FR 56941 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2013-09-16

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: 13-114] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel.... Harmony Myers, Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space...

  13. 77 FR 25502 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2012-04-30

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (12-030)] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announce a forthcoming meeting of the Aerospace Safety Advisory Panel... FURTHER INFORMATION CONTACT: Ms. Harmony Myers, Aerospace Safety Advisory Panel Executive Director...

  14. 77 FR 38090 - Aerospace Safety Advisory Panel; Meeting.

    Science.gov (United States)

    2012-06-26

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-044] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel.... Harmony Myers, Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space...

  15. 78 FR 1265 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2013-01-08

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-001] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel..., Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space Administration...

  16. 75 FR 6407 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2010-02-09

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (10- 020)] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announce a forthcoming meeting of the Aerospace Safety Advisory Panel... FURTHER INFORMATION CONTACT: Ms. Kathy Dakon, Aerospace Safety Advisory Panel Executive Director, National...

  17. 75 FR 61219 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2010-10-04

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (10-116)] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel... Dakon, Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space Administration...

  18. 77 FR 58413 - Aerospace Safety Advisory Panel; Meeting

    Science.gov (United States)

    2012-09-20

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-074] Aerospace Safety Advisory Panel... Aeronautics and Space Administration announces a forthcoming meeting of the Aerospace Safety Advisory Panel.... Harmony Myers, Aerospace Safety Advisory Panel Executive Director, National Aeronautics and Space...

  19. 75 FR 74026 - Biomass Research and Development Technical Advisory Committee

    Science.gov (United States)

    2010-11-30

    ... DEPARTMENT OF ENERGY Biomass Research and Development Technical Advisory Committee AGENCY.... SUMMARY: This notice announces an open meeting of the Biomass Research and Development Technical Advisory... participation. This notice announces the meeting of the Biomass Research and Development Technical Advisory...

  20. Remote control of data acquisition devices by means of message oriented middleware

    International Nuclear Information System (INIS)

    Sanchez, E.; Portas, A.; Pereira, A.; Vega, J.; Kirpitchev, I.

    2007-01-01

    The TJ-II autonomous acquisition systems are computers running dedicated applications for programming and controlling data acquisition channels and also integrating acquired data into the central database. These computers are located in the experimental hall and have to be remotely controlled during plasma discharges. A remote control for these systems has been implemented by taking advantage of the message-oriented middleware recently introduced into the TJ-II data acquisition system. Java Message Service (JMS) is used as the messaging application program interface. All the acquisition actions that are available through the system console of the data acquisition computers (starting or aborting an acquisition, restarting the system or updating the acquisition application) can now be initiated remotely. Command messages are sent to the acquisition systems located in the experimental hall close to the TJ-II device by using the messaging software, without having to use a remote desktop application that produces heavy network traffic and requires manual operation. Action commands can be sent to only one or to several/many acquisition systems at the same time. This software is integrated into the TJ-II remote participation system and the acquisition systems can be commanded from inside or outside the laboratory. All this software is integrated into the security framework provided by PAPI, thus preventing non-authorized users commanding the acquisition computers. In order to dimension and distribute messaging services some performance tests of the message oriented middleware software have been carried out. Results of the tests are presented. As suggested by the tests results different transport connectors are used: TCP transport protocol is used for the local environment, while HTTP protocol is used for remote accesses, thereby allowing the system performance to be optimized

  1. Remote control of data acquisition devices by means of message oriented middleware

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, E. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain)], E-mail: edi.sanchez@ciemat.es; Portas, A.; Pereira, A.; Vega, J.; Kirpitchev, I. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain)

    2007-10-15

    The TJ-II autonomous acquisition systems are computers running dedicated applications for programming and controlling data acquisition channels and also integrating acquired data into the central database. These computers are located in the experimental hall and have to be remotely controlled during plasma discharges. A remote control for these systems has been implemented by taking advantage of the message-oriented middleware recently introduced into the TJ-II data acquisition system. Java Message Service (JMS) is used as the messaging application program interface. All the acquisition actions that are available through the system console of the data acquisition computers (starting or aborting an acquisition, restarting the system or updating the acquisition application) can now be initiated remotely. Command messages are sent to the acquisition systems located in the experimental hall close to the TJ-II device by using the messaging software, without having to use a remote desktop application that produces heavy network traffic and requires manual operation. Action commands can be sent to only one or to several/many acquisition systems at the same time. This software is integrated into the TJ-II remote participation system and the acquisition systems can be commanded from inside or outside the laboratory. All this software is integrated into the security framework provided by PAPI, thus preventing non-authorized users commanding the acquisition computers. In order to dimension and distribute messaging services some performance tests of the message oriented middleware software have been carried out. Results of the tests are presented. As suggested by the tests results different transport connectors are used: TCP transport protocol is used for the local environment, while HTTP protocol is used for remote accesses, thereby allowing the system performance to be optimized.

  2. performance performance analysis of gsm networks in minna

    African Journals Online (AJOL)

    eobe

    in terms of key performance indicators (KPI) based on statistics performance indicators ... in this study. Keywords: GSM Network, Drive Test, KPI and Radio Frequency Network Optimization. 1. .... message (SMS) traffic or in scenarios where so.

  3. Nuclear fuel cycle modelling using MESSAGE

    International Nuclear Information System (INIS)

    Guiying Zhang; Dongsheng Niu; Guoliang Xu; Hui Zhang; Jue Li; Lei Cao; Zeqin Guo; Zhichao Wang; Yutong Qiu; Yanming Shi; Gaoliang Li

    2017-01-01

    In order to demonstrate the possibilities of application of MESSAGE tool for the modelling of a Nuclear Energy System at the national level, one of the possible open nuclear fuel cycle options based on thermal reactors has been modelled using MESSAGE. The steps of the front-end and back-end of nuclear fuel cycle and nuclear reactor operation are described. The optimal structure for Nuclear Power Development and optimal schedule for introducing various reactor technologies and fuel cycle options; infrastructure facilities, nuclear material flows and waste, investments and other costs are demonstrated. (author)

  4. Upon a Message-Oriented Trading API

    Directory of Open Access Journals (Sweden)

    Claudiu VINTE

    2010-01-01

    Full Text Available In this paper, we introduce the premises for a trading system application-programming interface (API based on a message-oriented middleware (MOM, and present the results of our research regarding the design and the implementation of a simulation-trading system employing a service-oriented architecture (SOA and messaging. Our research has been conducted with the aim of creating a simulation-trading platform, within the academic environment, that will provide both the foundation for future experiments with trading systems architectures, components, APIs, and the framework for research on trading strategies, trading algorithm design, and equity markets analysis tools. Mathematics Subject Classification: 68M14 (distributed systems.

  5. Topicality and impact in social media: diverse messages, focused messengers.

    Science.gov (United States)

    Weng, Lilian; Menczer, Filippo

    2015-01-01

    We have a limited understanding of the factors that make people influential and topics popular in social media. Are users who comment on a variety of matters more likely to achieve high influence than those who stay focused? Do general subjects tend to be more popular than specific ones? Questions like these demand a way to detect the topics hidden behind messages associated with an individual or a keyword, and a gauge of similarity among these topics. Here we develop such an approach to identify clusters of similar hashtags in Twitter by detecting communities in the hashtag co-occurrence network. Then the topical diversity of a user's interests is quantified by the entropy of her hashtags across different topic clusters. A similar measure is applied to hashtags, based on co-occurring tags. We find that high topical diversity of early adopters or co-occurring tags implies high future popularity of hashtags. In contrast, low diversity helps an individual accumulate social influence. In short, diverse messages and focused messengers are more likely to gain impact.

  6. The network is the message : Fase 1: het net ophalen

    NARCIS (Netherlands)

    Rogier Brussee; Dr. Gerrita van der Veen; Dr. Lotte M. Willemsen; Thijs Waardenburg

    2016-01-01

    Veel bedrijven staan reeds via social media als Facebook of Twitter in contact met hun gebruikers en iedere serieuze marketingcampagne werkt tegenwoordig met likes en tweets. Hoeveel ze daarin investeren en in de toekomst willen blijven doen, hangt af van de effectiviteit van social media. Maar

  7. Interface Message Processors for the ARPA Computer Network

    Science.gov (United States)

    1976-07-01

    and then clear the location) as its primitive locking facility (i.e., as the necessary multiprocessor lock equivalent to Dijkstra semaphores )[37]. To...of the extra storage required for the redundant copies. There is the problem of maintaining synchronization of multiple copy data bases in the presence...through any of the data base sites. I Update synchronization . Races between conflicting, "concurrent" update requests are resolved in a manner that j

  8. 77 FR 2700 - National Advisory Council on Minority Business Enterprise: Meeting of the National Advisory...

    Science.gov (United States)

    2012-01-19

    ... Business Enterprise: Meeting of the National Advisory Council on Minority Business Enterprise AGENCY.... SUMMARY: The National Advisory Council for Minority Business Enterprise (NACMBE) will hold its fifth... deliberate on possible recommendations. The Subcommittee topics include: (1) Definition of Minority Business...

  9. 77 FR 38065 - The President's Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting

    Science.gov (United States)

    2012-06-26

    ... for the implementation of best business practices to improve Federal Government management and... management, IT vendor performance management, Senior Executive Service (SES) leadership development and SES... President's Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting AGENCY...

  10. 77 FR 12841 - The President's Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting

    Science.gov (United States)

    2012-03-02

    ... for the implementation of best business practices to improve Federal Government management and... performance management, Senior Executive Service (SES) leadership development and SES performance appraisal... President's Management Advisory Board (PMAB); Notification of Upcoming Public Advisory Meeting AGENCY...

  11. 77 FR 55863 - NASA Advisory Council; Science Committee; Earth Science Subcommittee; Applied Sciences Advisory...

    Science.gov (United States)

    2012-09-11

    ... Committee; Earth Science Subcommittee; Applied Sciences Advisory Group Meeting AGENCY: National Aeronautics... the Applied Science Advisory Group. This Subcommittee reports to the Earth Science Subcommittee... following topics: --Applied Sciences Program Update --Earth Science Data Latency Study Preliminary Update...

  12. 76 FR 64122 - NASA Advisory Committee; Renewal of NASA's International Space Station Advisory Committee Charter

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-095)] NASA Advisory Committee; Renewal of NASA's International Space Station Advisory Committee Charter AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of renewal and amendment of the Charter of the International...

  13. 76 FR 5160 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2011-01-28

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Committee on Diversity for Communications in the Digital Age (``Diversity Committee''). ADDRESSES: A copy of...

  14. 76 FR 64348 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2011-10-18

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide...

  15. 77 FR 57085 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2012-09-17

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide...

  16. 77 FR 6113 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2012-02-07

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide...

  17. 78 FR 21354 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Science.gov (United States)

    2013-04-10

    ... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital Age AGENCY: Federal Communications Commission. ACTION: Notice of... Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide...

  18. Serving Boys through Readers' Advisory

    Science.gov (United States)

    Sullivan, Michael

    2010-01-01

    Based on more than twenty years' experience working to get boys interested in reading, the author now offers his first readers' advisory volume. With an emphasis on nonfiction and the boy-friendly categories of genre fiction, the work offers a wealth of material including: (1) Suggestions for how to booktalk one-on-one as well as in large groups;…

  19. ITER management advisory committee meeting

    International Nuclear Information System (INIS)

    Yoshikawa, M.

    2001-01-01

    The ITER Management Advisory Committee (MAC) Meeting was held on 23 February in Garching, Germany. The main topics were: the consideration of the report by the Director on the ITER EDA Status, the review of the Work Programme, the review of the Joint Fund, the review of a schedule of ITER meetings, and the arrangements for termination and wind-up of the EDA

  20. Joint Advisory Appeals Board report

    CERN Document Server

    Lalande, Amanda

    2018-01-01

    With regard to the internal appeal procedure, Article R VI 1.18 of the Staff Rules and Regulations states that unless the member of the personnel objects, (the) decision and report of the JAAB (Joint Advisory Appeals Board) shall be brought to the attention of the members of the personnel.

  1. ITER management advisory committee meeting

    International Nuclear Information System (INIS)

    Yoshikawa, M.

    2001-01-01

    The ITER Management Advisory Committee (MAC) Meeting was held in Vienna on 16 July 2001. It was the last MAC Meeting and the main topics were consideration of the report by the Director on the ITER EDA status, review of the Work Programme, review of the Joint Fund and arrangements for termination and wind-up of the EDA

  2. Developing effective messages about potable recycled water: The importance of message structure and content

    Science.gov (United States)

    Price, J.; Fielding, K. S.; Gardner, J.; Leviston, Z.; Green, M.

    2015-04-01

    Community opposition is a barrier to potable recycled water schemes. Effective communication strategies about such schemes are needed. Drawing on social psychological literature, two experimental studies are presented, which explore messages that improve public perceptions of potable recycled water. The Elaboration-Likelihood Model of information processing and attitude change is tested and supported. Study 1 (N = 415) premeasured support for recycled water, and trust in government information at Time 1. Messages varied in complexity and sidedness were presented at Time 2 (3 weeks later), and support and trust were remeasured. Support increased after receiving information, provided that participants received complex rather than simple information. Trust in government was also higher after receiving information. There was tentative evidence of this in response to two-sided messages rather than one-sided messages. Initial attitudes to recycled water moderated responses to information. Those initially neutral or ambivalent responded differently to simple and one-sided messages, compared to participants with positive or negative attitudes. Study 2 (N = 957) tested the effectiveness of information about the low relative risks, and/or benefits of potable recycled water, compared to control groups. Messages about the low risks resulted in higher support when the issue of recycled water was relevant. Messages about benefits resulted in higher perceived issue relevance, but did not translate into greater support. The results highlight the importance of understanding people's motivation to process information, and need to tailor communication to match attitudes and stage of recycled water schemes' development.

  3. 77 FR 25706 - Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group

    Science.gov (United States)

    2012-05-01

    ... DEPARTMENT OF DEFENSE Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group AGENCY: Department of Defense. ACTION: Notice of Advisory Committee closed meeting.... [[Page 25707

  4. 77 FR 51966 - Eastern Arizona Resource Advisory Committee

    Science.gov (United States)

    2012-08-28

    ... DEPARTMENT OF AGRICULTURE Forest Service Eastern Arizona Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The Eastern Arizona Resource Advisory Committee...

  5. An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility.

    Science.gov (United States)

    Park, Jihong; Kim, Ki-Hyung; Kim, Kangseok

    2017-04-19

    The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms.

  6. Administering truncated receive functions in a parallel messaging interface

    Science.gov (United States)

    Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E

    2014-12-09

    Administering truncated receive functions in a parallel messaging interface (`PMI`) of a parallel computer comprising a plurality of compute nodes coupled for data communications through the PMI and through a data communications network, including: sending, through the PMI on a source compute node, a quantity of data from the source compute node to a destination compute node; specifying, by an application on the destination compute node, a portion of the quantity of data to be received by the application on the destination compute node and a portion of the quantity of data to be discarded; receiving, by the PMI on the destination compute node, all of the quantity of data; providing, by the PMI on the destination compute node to the application on the destination compute node, only the portion of the quantity of data to be received by the application; and discarding, by the PMI on the destination compute node, the portion of the quantity of data to be discarded.

  7. Positive mood can increase or decrease message scrutiny: the hedonic contingency view of mood and message processing.

    Science.gov (United States)

    Wegener, D T; Petty, R E; Smith, S M

    1995-07-01

    Currently dominant explanations of mood effects on persuasive message processing (i.e., cognitive capacity and feelings as information) predict that happy moods lead to less message scrutiny than neutral or sad moods. The hedonic contingency view (D. T. Wegener & R. E. Petty, 1994) predicts that happy moods can sometimes be associated with greater message processing activity because people in a happy mood are more attentive than neutral or sad people to the hedonic consequences of their actions. Consistent with this view, Experiment 1 finds that a happy mood can lead to greater message scrutiny than a neutral mood when the message is not mood threatening. Experiment 2 finds that a happy mood leads to greater message scrutiny than a sad mood when an uplifting message is encountered, but to less message scrutiny when a depressing message is encountered.

  8. University Advertising and Universality in Messaging

    Science.gov (United States)

    Diel, Stan R.; Katsinas, Stephen

    2018-01-01

    University and college institutional advertisements, which typically are broadcast as public service announcements during the halftime of football games, were the subject of a quantitative analysis focused on commonality in messaging and employment of the semiotic theory of brand advertising. Findings indicate advertisements focus on students'…

  9. Message passing with parallel queue traversal

    Science.gov (United States)

    Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM

    2012-05-01

    In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.

  10. Picture Book Soldiers: Men and Messages.

    Science.gov (United States)

    Desai, Christina M.

    2001-01-01

    Examines children's picture books about soldiers and war, including fiction, folktales, and historical fiction, analyzing their implicit and explicit messages about war and the military, and evaluating them for gender stereotyping. Finds that the soldiers conform almost uniformly to an exaggerated male stereotype. Shows different value judgments…

  11. An approach for message exchange using archetypes.

    Science.gov (United States)

    Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F

    2013-01-01

    The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.

  12. Graphical route information on variable message signs

    NARCIS (Netherlands)

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but

  13. Princess Picture Books: Content and Messages

    Science.gov (United States)

    Dale, Lourdes P.; Higgins, Brittany E.; Pinkerton, Nick; Couto, Michelle; Mansolillo, Victoria; Weisinger, Nica; Flores, Marci

    2016-01-01

    Because many girls develop their understanding of what it means to be a girl from books about princesses, the researchers coded the messages and content in 58 princess books (picture, fairy tales, and fractured fairy tales). Results indicate that gender stereotypes are present in the books--the princesses were more likely to be nurturing, in…

  14. Increasing the Operational Value of Event Messages

    Science.gov (United States)

    Li, Zhenping; Savkli, Cetin; Smith, Dan

    2003-01-01

    Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.

  15. An Interpersonal Approach to Writing Negative Messages.

    Science.gov (United States)

    Salerno, Douglas

    1988-01-01

    Asserts that textbook advice regarding buffers and negative messages is simplistic and frequently wrong, and analyses 22 job-refusal letters and their effectiveness. Claims that recent research on cognitive complexity and social perspective-taking suggests the need for more sophisticated audience analysis protocols for dealing with the negative…

  16. Interactive or interruptive? Instant messaging at work

    NARCIS (Netherlands)

    Ou, C.X.J.; Davison, R.M.

    2011-01-01

    The use of instant messaging (IM) technology at work is controversial, due to the interruptions it may cause and the difficulties associated with quantifying its benefits for individuals, teams and organizations. In this study, we investigate the use and impact of IM tools in the workplace. Based on

  17. Using Instant Messaging for Online Reference Service

    Science.gov (United States)

    Forster, Shirley

    2006-01-01

    Many libraries are using co-browsing chat products to provide reference services to their patrons, whilst their patrons are online and using the internet. The concept of such an online service is highly desirable, but many libraries are concerned that they will never be able to afford such a system. This may have changed: Instant Messaging (IM)…

  18. 75 FR 51985 - Federal Advisory Committee; Advisory Council on Dependents' Education (ACDE)

    Science.gov (United States)

    2010-08-24

    ... Advisory Council on Dependents' Education (ACDE) scheduled for September 8, 2010, is cancelled. The meeting... submit written statements to the Advisory Council on Dependents' Education about its mission and... planned meeting of the Advisory Council on Dependents' Education. All written statements shall be...

  19. 75 FR 36373 - Federal Advisory Committee; Advisory Council on Dependents' Education

    Science.gov (United States)

    2010-06-25

    ..., the Department of Defense announces that the Advisory Council on Dependents' Education will meet on... response to the stated agenda of the planned meeting of the Advisory Council on Dependents' Education. All... membership for their consideration. For the next meeting of the Advisory Council on Dependents' Education, Dr...

  20. 75 FR 9184 - Federal Advisory Committee; Advisory Council on Dependents' Education; Open Meeting

    Science.gov (United States)

    2010-03-01

    ... 102-3.150, the Department of Defense announces that the Advisory Council on Dependents' Education will... Advisory Council on Dependents' Education about its mission and functions. Written statements may be... Advisory Council on Dependents' Education, Mr. Charles Toth, telephone (703) 588-3105, 4040 North Fairfax...

  1. 75 FR 33616 - Science Advisory Board Staff Office; Notification of Closed Meetings of the Science Advisory...

    Science.gov (United States)

    2010-06-14

    ... Closed Meetings of the Science Advisory Board's Scientific and Technological Achievement Awards Committee... Agency's (EPA), Science Advisory Board (SAB) Staff Office announces a meeting and teleconference of the....gov . The SAB Mailing address is: U.S. EPA Science Advisory Board (1400F), U.S. Environmental...

  2. 76 FR 44912 - Science Advisory Board Staff Office; Notification of Closed Meetings of the Science Advisory...

    Science.gov (United States)

    2011-07-27

    ... Closed Meetings of the Science Advisory Board's Scientific and Technological Achievement Awards Committee... Agency's (EPA), Science Advisory Board (SAB) Staff Office announces a meeting and teleconference of the[email protected] . The SAB Mailing address is: U.S. EPA Science Advisory Board (1400R), U.S. Environmental...

  3. 76 FR 45402 - Advisory Committee; Medical Imaging Drugs Advisory Committee; Re-Establishment

    Science.gov (United States)

    2011-07-29

    .... FDA-2010-N-0002] Advisory Committee; Medical Imaging Drugs Advisory Committee; Re- Establishment... (FDA) is announcing the re- establishment of the Medical Imaging Drugs Advisory Committee in FDA's Center for Drug Evaluation and Research. This rule amends the current language for the Medical Imaging...

  4. Linear network error correction coding

    CERN Document Server

    Guang, Xuan

    2014-01-01

    There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences?similar to algebraic coding,?and also briefly discuss the main results following the?other approach,?that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances an

  5. Video: useful tool for delivering family planning messages.

    Science.gov (United States)

    Sumarsono, S K

    1985-10-01

    In 1969, the Government of Indonesia declared that the population explosion was a national problem. The National Family Planning Program was consequently launched to encourage adoption of the ideal of a small, happy and prosperous family norm. Micro-approach messages are composed of the following: physiology of menstruation; reproductive process; healthy pregnancy; rational family planning; rational application of contraceptives; infant and child care; nutrition improvement; increase in breastfeeding; increase in family income; education in family life; family health; and deferred marriage age. Macro-approach messages include: the population problem and its impact on socioeconomic aspects; efforts to cope with the population problem; and improvement of women's lot. In utilizing the media and communication channels, the program encourages the implementation of units and working units of IEC to produce IEC materials; utilizes all possible existing media and IEC channels; maintains the consistent linkage between the activity of mass media and the IEC activities in the field; and encourages the private sector to participate in the production of IEC media and materials. A media production center was set up and carries out the following activities: producing video cassettes for tv broadcasts of family planning drama, family planning news, and tv spots; producing duplicates of the video cassettes for distribution to provinces in support of the video network; producing teaching materials for family planning workers; and transfering family planning films into video cassettes. A video network was developed and includes video monitors in family planning service points such as hospitals, family planning clinics and public places like bus stations. In 1985, the program will be expanded by 50 mobile information units equipped with video monitors. Video has potentials to increase the productivity and effectiveness of the family planning program. The video production process is

  6. An adaptive routing strategy for packet delivery in complex networks

    International Nuclear Information System (INIS)

    Zhang, Huan; Liu, Zonghua; Tang, Ming; Hui, P.M.

    2007-01-01

    We present an efficient routing approach for delivering packets in complex networks. On delivering a message from a node to a destination, a node forwards the message to a neighbor by estimating the waiting time along the shortest path from each of its neighbors to the destination. This projected waiting time is dynamical in nature and the path through which a message is delivered would be adapted to the distribution of messages in the network. Implementing the approach on scale-free networks, we show that the present approach performs better than the shortest-path approach and another approach that takes into account of the waiting time only at the neighboring nodes. Key features in numerical results are explained by a mean field theory. The approach has the merit that messages are distributed among the nodes according to the capabilities of the nodes in handling messages

  7. An effect of loudness of advisory speech on a choice response task

    Science.gov (United States)

    Utsuki, Narisuke; Takeuchi, Yoshinori; Nomiyama, Takenori

    1995-03-01

    Recent technologies have realized talking advisory/guidance systems in which machines give advice and guidance to operators in speech. However, nonverbal aspects of spoken messages may have significant effects on an operator's behavior. Twelve subjects participated in a TV game-like choice response task where they were asked to choose a 'true' target from three invader-like figures displayed on a CRT screen. The subjects had received a prerecorded advice designating either left, center, or right target that would be true before each choice. The position of the 'true' targets and advice were preprogrammed in pseudorandom sequences. In other words, there was no way for the subjects to predict the 'true' target and there was no relationship between spoken advice and the true target position. The subjects tended to make more choices corresponding to the presented messages when the messages were presented in a louder voice than in a softer voice. Choice response time was significantly shorter when the response was the same as the advice indicated. The shortening of response time was slightly greater when advice was presented in a louder voice. This study demonstrates that spoken advice may result in faster and less deliberate reponses in accordance with the presented messages which are given by talking guidance systems.

  8. Effectiveness of safety and public service announcement messages on dynamic message signs.

    Science.gov (United States)

    2014-07-01

    The number of transportation agencies that use dynamic message signs (DMS) to provide traffic information to motorists has increased dramatically over the past four decades. This growing trend of DMS deployment is a reflection of the public interest ...

  9. Implications of advanced warning messages on eliminating sun glare disturbances at signalized intersections

    Directory of Open Access Journals (Sweden)

    Qing Li

    2016-08-01

    Full Text Available Due to sun glare disturbances, drivers encounter fatal threats on roadways, particularly at signalized intersections. Many studies have attempted to develop applicable solutions, such as avoiding sun positions, applying road geometric re-directions, and wearing anti-glare glasses. None of these strategies have fully solved the problem. As one of the “Connected Vehicle” practices proposed by the U.S. Department of Transportation, advanced warning messages (AWMs are capable of providing wireless information about traffic controls. AWM acts as a supplement to conventional signs and signals, which can be blocked by obstacles or natural disturbances, such as sun glare. The drivers' smart advisory system (DSAS can provide drivers with AWM. Using a driving simulator this research explores the effects of DSAS messages on driving behaviors under sun glare disturbance. Statistical analyses were applied to assess (1 the negative impacts of sun glare, (2 the compensation of the DSAS AWM to sun glare effects, and (3 the improvement in driving performance due to DSAS AWM. Four performance indexes were measured, including (1 half kinetic energy speed, (2 mean approach speed, (3 brake response time, and (4 braking distance. The effects of the socio-demographic factors, such as gender, age, educational background, and driving experience were also studied. The analytical results illustrate that the DSAS can compensate for reduced visibility due to sun glare and improve driving performance to a normal visual situation, particularly for left turn and through movement.

  10. 75 FR 9416 - Advisory Committee Information Hotline

    Science.gov (United States)

    2010-03-02

    ... Microbiology Devices Panel 3014512517 Molecular and Clinical Genetics Panel 3014510231 Neurological Devices... CENTER FOR VETERINARY MEDICINE Veterinary Medicine Advisory Committee 3014512548 NATIONAL CENTER FOR...

  11. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  12. Investigating the impact of viral message appeal and message credibility on consumer attitude toward brand

    Directory of Open Access Journals (Sweden)

    Majid Esmaeilpour

    2016-12-01

    Full Text Available Background - Due to the rapid growth of the Internet and use of e-commerce in recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers' attitude with mediating role of intellectual involvement of consumers and their risk taking level. Purpose - The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. Design/methodology/approach – The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, data were analyzed through smart PLS software. Findings –The results show that the appeal and credibility of the message source have impact on consumer attitudes toward the brand. It was also found that intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brand. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role. Research limitations/implications – Data collection tool was questionnaire in this study, and questionnaire has some disadvantages that can affect the results. Additionally, this study was conducted in Bushehr city (Iran. Therefore, we should be cautious in generalizing the findings. Originality/value – In this study, the effect of message appeal and message source credibility on consumer attitude to brand was examined. The risk taking level of consumer and his involvement level were considered

  13. Competing edge networks

    Science.gov (United States)

    Parsons, Mark; Grindrod, Peter

    2012-06-01

    We introduce a model for a pair of nonlinear evolving networks, defined over a common set of vertices, subject to edgewise competition. Each network may grow new edges spontaneously or through triad closure. Both networks inhibit the other's growth and encourage the other's demise. These nonlinear stochastic competition equations yield to a mean field analysis resulting in a nonlinear deterministic system. There may be multiple equilibria; and bifurcations of different types are shown to occur within a reduced parameter space. This situation models competitive communication networks such as BlackBerry Messenger displacing SMS; or instant messaging displacing emails.

  14. Investigating the impact of viral message appeal and message credibility on consumer attitude toward the brand

    Directory of Open Access Journals (Sweden)

    Esmaeilpour Majid

    2016-07-01

    Full Text Available Due to the rapid growth of the Internet and use of e-commerce in the recent years, viral marketing has drawn the attention of manufacturing and service organizations. However, no research has been conducted to examine the impact of message appeal and message source credibility on consumers’ attitude with mediating role of intellectual involvement of consumers and their risk taking level. The aim of this study was to examine the impact of appeal and message source credibility on consumers’ attitude with mediating role of consumers’ intellectual involvement and their risk taking level. The population of this study includes consumers of mobile phones (Samsung, Sony, Nokia, LG and iPhone in the Bushehr city (Iran. As the population of the study is unlimited, 430 questionnaires were distributed using available sampling method, and 391 questionnaires were collected and analyzed. Using structural equation modeling, we analysed the data through smart PLS software. The results show that the appeal and credibility of the message source impact the consumer attitudes toward the brand. We also found that the intellectual involvement of consumers plays the mediating role in the relationship between message appeal and consumer attitudes toward brands. In the relationship between message source credibility and customer attitude towards the brand, the level of risk taking of people has no mediating role.

  15. Preventing messaging queue deadlocks in a DMA environment

    Science.gov (United States)

    Blocksome, Michael A; Chen, Dong; Gooding, Thomas; Heidelberger, Philip; Parker, Jeff

    2014-01-14

    Embodiments of the invention may be used to manage message queues in a parallel computing environment to prevent message queue deadlock. A direct memory access controller of a compute node may determine when a messaging queue is full. In response, the DMA may generate and interrupt. An interrupt handler may stop the DMA and swap all descriptors from the full messaging queue into a larger queue (or enlarge the original queue). The interrupt handler then restarts the DMA. Alternatively, the interrupt handler stops the DMA, allocates a memory block to hold queue data, and then moves descriptors from the full messaging queue into the allocated memory block. The interrupt handler then restarts the DMA. During a normal messaging advance cycle, a messaging manager attempts to inject the descriptors in the memory block into other messaging queues until the descriptors have all been processed.

  16. Using Publish-Subscribe Messaging for System Status and Automation

    Science.gov (United States)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  17. Outpatient blood pressure monitoring using bi-directional text messaging.

    Science.gov (United States)

    Anthony, Chris A; Polgreen, Linnea A; Chounramany, James; Foster, Eric D; Goerdt, Christopher J; Miller, Michelle L; Suneja, Manish; Segre, Alberto M; Carter, Barry L; Polgreen, Philip M

    2015-05-01

    To diagnose hypertension, multiple blood pressure (BP) measurements are recommended. We randomized patients into three groups: EMR-only (patients recorded BP measurements in an electronic medical record [EMR] web portal), EMR + reminders (patients were sent text message reminders to record their BP measurements in the EMR), and bi-directional text messaging (patients were sent a text message asking them to respond with their current BP). Subjects were asked to complete 14 measurements. Automated messages were sent to each patient in the bi-directional text messaging and EMR + reminder groups twice daily. Among 121 patients, those in the bi-directional text messaging group reported the full 14 measurements more often than both the EMR-only group (P text messaging is an effective way to gather patient BP data. Text-message-based reminders alone are an effective way to encourage patients to record BP measurements. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  18. Effects of Instant Messaging on School Performance in Adolescents.

    Science.gov (United States)

    Grover, Karan; Pecor, Keith; Malkowski, Michael; Kang, Lilia; Machado, Sasha; Lulla, Roshni; Heisey, David; Ming, Xue

    2016-06-01

    Instant messaging may compromise sleep quality and school performance in adolescents. We aimed to determine associations between nighttime messaging and daytime sleepiness, self-reported sleep parameters, and/or school performance. Students from 3 high schools in New Jersey completed anonymous questionnaires assessing sleep duration, daytime sleepiness, messaging habits, and academic performance. Of the 2,352 students sampled, 1,537 responses were contrasted among grades, sexes, and messaging duration, both before and after lights out. Students who reported longer duration of messaging after lights out were more likely to report a shorter sleep duration, higher rate of daytime sleepiness, and poorer academic performance. Messaging before lights out was not associated with higher rates of daytime sleepiness or poorer academic performance. Females reported more messaging, more daytime sleepiness, and better academic performance than males. There may be an association between text messaging and school performance in this cohort of students. © The Author(s) 2016.

  19. Priority Queue Based Reactive Buffer Management Policy for Delay Tolerant Network under City Based Environments.

    Directory of Open Access Journals (Sweden)

    Qaisar Ayub

    Full Text Available Delay Tolerant Network (DTN multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.

  20. Priority Queue Based Reactive Buffer Management Policy for Delay Tolerant Network under City Based Environments.

    Science.gov (United States)

    Ayub, Qaisar; Ngadi, Asri; Rashid, Sulma; Habib, Hafiz Adnan

    2018-01-01

    Delay Tolerant Network (DTN) multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl) parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl) is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R) for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.

  1. Exploring bi-directional and SMS messaging for communications between Public Health Agencies and their stakeholders: a qualitative study.

    Science.gov (United States)

    Revere, Debra; Calhoun, Rebecca; Baseman, Janet; Oberle, Mark

    2015-07-08

    Communication technologies that enable bi-directional/two-way communications and cell phone texting (SMS) between public health agencies and their stakeholders may improve public health surveillance, ensure targeted distribution of alerts to hard-to-reach populations, reduce mortality and morbidity in an emergency, and enable a crucial feedback loop between public health agencies and the communities they serve. Building on prior work regarding health care provider preferences for receiving one-way public health communications by email, fax or SMS, we conducted a formative, exploratory study to understand how a bi-directional system and the incorporation of SMS in that system might be used as a strategy to send and receive messages between public health agencies and community-based organizations which serve vulnerable populations, health care providers, and public health workers. Our research question: Under what conditions and/or situations might public health agencies utilize bi-directional and/or SMS messaging for disseminating time-sensitive public health information (alerts, advisories, updates, etc.) to their stakeholders? A mixed methods (qualitative and quantitative) study was conducted between April and July 2014. Data collection included a survey distributed to health care providers and semi-structured interviews with providers, community- and government-based organization leaders and directors, and public health agency internal workforce staff. Survey respondents and interviewees were asked about their exposure to public health messages, how these messages are received and how the information in these messages are handled, and in what situations (for example, a local vs. a national event, a pandemic or emergency vs. a health update) a bi-directional and/or SMS messaging system might improve communications between public health agencies and their stakeholder group. Interview and survey data were qualitatively analyzed. Thematic codes were quantitized into

  2. The Effectiveness of Campaign Messages on Turnout and Vote Choice

    OpenAIRE

    Friedel, Sylvia

    2013-01-01

    In this dissertation, I study campaign effects on turnout and vote choice. I analyze different campaign messages and the way they affect voters across various situations. First, through an online survey experiment, I study the impact of campaign messages and ideological cues on voters as they make inferences on candidates. Next, through a field experiment, I test whether microtargeted messages or general messages on the economy have any effect on turnout. Lastly, using online survey data, I e...

  3. Aerospace Safety Advisory Panel

    Science.gov (United States)

    1999-01-01

    This report covers the activities of the Aerospace Safety Advisory Panel (ASAP) for calendar year 1998-a year of sharp contrasts and significant successes at NASA. The year opened with the announcement of large workforce cutbacks. The slip in the schedule for launching the International Space Station (ISS) created a five-month hiatus in Space Shuttle launches. This slack period ended with the successful and highly publicized launch of the STS-95 mission. As the year closed, ISS assembly began with the successful orbiting and joining of the Functional Cargo Block (FGB), Zarya, from Russia and the Unity Node from the United States. Throughout the year, the Panel maintained its scrutiny of NASA's safety processes. Of particular interest were the potential effects on safety of workforce reductions and the continued transition of functions to the Space Flight Operations Contractor. Attention was also given to the risk management plans of the Aero-Space Technology programs, including the X-33, X-34, and X-38. Overall, the Panel concluded that safety is well served for the present. The picture is not as clear for the future. Cutbacks have limited the depth of talent available. In many cases, technical specialties are 'one deep.' The extended hiring freeze has resulted in an older workforce that will inevitably suffer significant departures from retirements in the near future. The resulting 'brain drain' could represent a future safety risk unless appropriate succession planning is started expeditiously. This and other topics are covered in the section addressing workforce. The major NASA programs are also limited in their ability to plan property for the future. This is of particular concern for the Space Shuttle and ISS because these programs are scheduled to operate well into the next century. In the case of the Space Shuttle, beneficial and mandatory safety and operational upgrades are being delayed because of a lack of sufficient present funding. Likewise, the ISS has

  4. Teaching Students the Persuasive Message through Small Group Activity

    Science.gov (United States)

    Creelman, Valerie

    2008-01-01

    Teaching students to write persuasive messages is a critical feature of any undergraduate business communications course. For the persuasive writing module in the author's course, students write a persuasive message on the basis of the four-part indirect pattern often used for sales or fund-raising messages. The course text she uses identifies…

  5. The Message Reporting System of the ATLAS DAQ System

    CERN Document Server

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  6. Using Text-Messaging in the Secondary Classroom

    Science.gov (United States)

    Thomas, Kevin; Orthober, Corrie

    2011-01-01

    To examine the potential uses of and barriers to text-messaging in secondary schools, three classes (66 students) of high school students used their personal mobile phones to receive out of school, course-related text-messages from teachers. Forty-six students (70%) agreed to receive text-messages. Findings indicate that participants found…

  7. Driver memory for in-vehicle visual and auditory messages

    Science.gov (United States)

    1999-12-01

    Three experiments were conducted in a driving simulator to evaluate effects of in-vehicle message modality and message format on comprehension and memory for younger and older drivers. Visual icons and text messages were effective in terms of high co...

  8. Understanding health food messages on Twitter for health literacy promotion.

    Science.gov (United States)

    Zhou, J; Liu, F; Zhou, H

    2018-05-01

    With the popularity of social media, Twitter has become an important tool to promote health literacy. However, many health-related messages on Twitter are dead-ended and cannot reach many people. This is unhelpful for health literacy promotion. This article aims to examine the features of online health food messages that people like to retweet. We adopted rumour theory as our theoretical foundation and extracted seven characteristics (i.e. emotional valence, attractiveness, sender's authoritativeness, external evidence, argument length, hashtags, and direct messages). A total of 10,025 health-related messages on Twitter were collected, and 1496 messages were randomly selected for further analysis. Each message was treated as one unit and then coded. All the hypotheses were tested with logistic regression. Emotional valence, attractiveness, sender's authoritativeness, argument length, and direct messages in a Twitter message had positive effects on people's retweet behaviour. The effect of external evidence was negative. Hashtags had no significant effect after consideration of other variables. Online health food messages containing positive emotions, including pictures, containing direct messages, having an authoritative sender, having longer arguments, or not containing external URLs are more likely to be retweeted. However, a message only containing positive or negative emotions or including direct messages without any support information will not be retweeted.

  9. Lol: New Language and Spelling in Instant Messaging

    Science.gov (United States)

    Varnhagen, Connie K.; McFall, G. Peggy; Pugh, Nicole; Routledge, Lisa; Sumida-MacDonald, Heather; Kwong, Trudy E.

    2010-01-01

    Written communication in instant messaging, text messaging, chat, and other forms of electronic communication appears to have generated a "new language" of abbreviations, acronyms, word combinations, and punctuation. In this naturalistic study, adolescents collected their instant messaging conversations for a 1-week period and then completed a…

  10. 19 CFR 4.7d - Container status messages.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Container status messages. 4.7d Section 4.7d... TREASURY VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.7d Container status messages. (a) Container status messages required. In addition to the advance filing requirements pursuant...

  11. MMS: An electronic message management system for emergency response

    DEFF Research Database (Denmark)

    Andersen, H.B.; Garde, H.; Andersen, V.

    1998-01-01

    among messages can be viewed in a graphic tree-like display. By employing the extensive filtration facilities offered by the MMS. users are able to monitor the current status of messages. And, in general, filtration provides users with means of surveying a possibly large number of responses to messages...... contingency plan and procedures to be applied during predefined stages of an emergency....

  12. WEALTH MANAGEMENT THROUGH ROBO ADVISORY

    OpenAIRE

    Ishmeet Singh; Navjot Kaur

    2017-01-01

    Use of artificial intelligence is changing the working styles of human beings in almost every sphere. From Travel, health, education, communication and other related fields, it has now entered wealth management. A number of wealth management firms have adopted the artificial intelligence based services to the clients so that they are able to get investment advice any time as per their convenience. These services are quickly accessible, cheaper, transparent and unbiased. Since the advisory ser...

  13. Advisory group on ionising radiation

    International Nuclear Information System (INIS)

    Harrison, J.R.

    1996-01-01

    The Advisory Group on Ionising Radiation has a busy and challenging work programme. Its reports will be published in the Documents of the NRPB series. These may advise further research or could form the basis of formal NRPB advice. Covering the full spectrum of radiation issues at work, in public health and clinical medicine, and the environment, it should enhance the radiation advice available to NRPB. (author)

  14. Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss

    Directory of Open Access Journals (Sweden)

    Avinash Srinivasan

    2015-08-01

    Full Text Available Information hiding techniques, especially steganography, have been extensively researched for over two decades. Nonetheless, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones, which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose Android-Stego - a framework for steganography employing smart-phones. Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers' communication networks such as Verizon and Sprint. A key contribution of our research presented in this paper is the benchmark results we have provided by analyzing real world cellular carriers network restrictions on MMS message size. We have also analyzed the actions the carriers take - such as compression and/or format conversion - on MMS messages that fall outside the established MMS communication norm, which varies for each service provider. Finally, We have used these benchmark results in implementing Android-Stego such that it is sensitive to carrier restrictions and robust to message loss.

  15. Politeness Strategies Used in Text Messaging

    Directory of Open Access Journals (Sweden)

    Shahrzad Eshghinejad

    2016-03-01

    Full Text Available One aspect of short message service (SMS communication through a cell phone is use of politeness strategies. As it is extensively argued that females are more polite language users, the present study sought to describe the strategies used by these two groups and to find out whether there is any significant difference between male and female English as a foreign language (EFL learners in the use of positive and negative politeness strategies in sending SMS to their professors, considering that there is an asymmetric power relation and social distance between them. To this end, a corpus of 300 L1 (Persian and L2 (English request messages was compiled. Results of qualitative and quantitative data analysis showed no significant difference between the two groups. Results of the study have implication in politeness research.

  16. Text Messaging for Addiction: A Review

    Science.gov (United States)

    Keoleian, Victoria; Polcin, Douglas; Galloway, Gantt P.

    2015-01-01

    Individuals seeking treatment for addiction often experience barriers due to cost, lack of local treatment resources, or either school or work schedule conflicts. Text messaging-based addiction treatment is inexpensive and has the potential to be widely accessible in real time. We conducted a comprehensive literature review identifying 11 published randomized controlled trials (RCTs) evaluating text messaging-based interventions for tobacco smoking, 4 studies for reducing alcohol consumption, 1 pilot study in former methamphetamine (MA) users, and 1 study based on qualitative interviews with cannabis users. Abstinence outcome results in RCTs of smokers willing to make a quit attempt have been positive overall in the short term and as far out as at 6 and 12 months. Studies aimed at reducing alcohol consumption have been promising. More data are needed to evaluate the feasibility, acceptability, and efficacy of this approach for other substance use problems. PMID:25950596

  17. Mobile text messaging solutions for obesity prevention

    Science.gov (United States)

    Akopian, David; Jayaram, Varun; Aaleswara, Lakshmipathi; Esfahanian, Moosa; Mojica, Cynthia; Parra-Medina, Deborah; Kaghyan, Sahak

    2011-02-01

    Cellular telephony has become a bright example of co-evolution of human society and information technology. This trend has also been reflected in health care and health promotion projects which included cell phones in data collection and communication chain. While many successful projects have been realized, the review of phone-based data collection techniques reveals that the existing technologies do not completely address health promotion research needs. The paper presents approaches which close this gap by extending existing versatile platforms. The messaging systems are designed for a health-promotion research to prevent obesity and obesity-related health disparities among low-income Latino adolescent girls. Messaging and polling mechanisms are used to communicate and automatically process response data for the target constituency. Preliminary survey data provide an insight on phone availability and technology perception for the study group.

  18. Sentiment analysis to determine the impact of online messages on smokers' choices to use varenicline.

    Science.gov (United States)

    Cobb, Nathan K; Mays, Darren; Graham, Amanda L

    2013-12-01

    Social networks are a prominent component of online smoking cessation interventions. This study applied sentiment analysis-a data processing technique that codes textual data for emotional polarity-to examine how exposure to messages about the cessation drug varenicline affects smokers' decision making around its use. Data were from QuitNet, an online social network dedicated to smoking cessation and relapse prevention. Self-reported medication choice at registration and at 30 days was coded among new QuitNet registrants who participated in at least one forum discussion mentioning varenicline between January 31, 2005 and March 9, 2008. Commercially available software was used to code the sentiment of forum messages mentioning varenicline that occurred during this time frame. Logistic regression analyses examined whether forum message exposure predicted medication choice. The sample of 2132 registrants comprised mostly women (78.3%), white participants (83.4%), averaged 41.2 years of age (SD = 10.9), and smoked on average 21.5 (SD = 9.7) cigarettes/day. After adjusting for potential confounders, as exposure to positive varenicline messages outweighed negative messages, the odds of switching to varenicline (odds ratio = 2.05, 95% confidence interval = 1.66 to 2.54) and continuing to use varenicline (odds ratio = 2.46, 95% confidence interval = 1.96 to 3.10) statistically significantly increased. Sentiment analysis is a useful tool for analyzing text-based data to examine their impact on behavior change. Greater exposure to positive sentiment in online conversations about varenicline is associated with a greater likelihood that smokers will choose to use varenicline in a quit attempt.

  19. The perfect message at the perfect moment.

    Science.gov (United States)

    Kalyanam, Kirthi; Zweben, Monte

    2005-11-01

    Marketers planning promotional campaigns ask questions to boost the odds that the messages will be accepted: Who should receive each message? What should be its content? How should we deliver it? The one question they rarely ask is, when should we deliver it? That's too bad, because in marketing, timing is arguably the most important variable of all. Indeed, there are moments in a customer's relationship with a business when she wants to communicate with that business because something has changed. If the company contacts her with the right message in the right format at the right time, there's a good chance of a warm reception. The question of "when" can be answered by a new computer-based model called "dialogue marketing," which is, to date, the highest rung on an evolutionary ladder that ascends from database marketing to relationship marketing to one-to-one marketing. Its principle advantages over older approaches are that it is completely interactive, exploits many communication channels, and is "relationship aware": that is, it continuously tracks every nuance of the customer's interaction with the business. Thus, dialogue marketing responds to each transition in that relationship at the moment the customer requires attention. Turning a traditional marketing strategy into a dialogue-marketing program is a straightforward matter. Begin by identifying the batch communications you make with customers, then ask yourself what events could trigger those communications to make them more timely. Add a question or call to action to each message and prepare a different treatment or response for each possible answer. Finally, create a series of increasingly urgent calls to action that kick in if the question or call to action goes unanswered by the customer. As dialogue marketing proliferates, it may provide the solid new footing that Madison Avenue seeks.

  20. Beach Advisory and Closing Online Notification (BEACON) system

    Science.gov (United States)

    Beach Advisory and Closing Online Notification system (BEACON) is a colletion of state and local data reported to EPA about beach closings and advisories. BEACON is the public-facing query of the Program tracking, Beach Advisories, Water quality standards, and Nutrients database (PRAWN) which tracks beach closing and advisory information.

  1. 75 FR 17701 - High Energy Physics Advisory Panel

    Science.gov (United States)

    2010-04-07

    ... DEPARTMENT OF ENERGY High Energy Physics Advisory Panel AGENCY: Department of Energy, Office of... Physics Advisory Panel (HEPAP). Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770) requires... Energy Physics Advisory Panel; U.S. Department of Energy; SC-25/ Germantown Building, 1000 Independence...

  2. 77 FR 42298 - Biomass Research and Development Technical Advisory Committee

    Science.gov (United States)

    2012-07-18

    ... Biomass Research and Development Technical Advisory Committee (Technical Advisory Committee). DATES: The... 9008(d) established the Biomass Research and Development Technical Advisory Committee and lays forth... nomination. Appointments to the Biomass Research and Development Technical Advisory Committee will be made by...

  3. Mobile phone messaging for preventive health care.

    Science.gov (United States)

    Vodopivec-Jamsek, Vlasta; de Jongh, Thyra; Gurol-Urganci, Ipek; Atun, Rifat; Car, Josip

    2012-12-12

    Preventive health care promotes health and prevents disease or injuries by addressing factors that lead to the onset of a disease, and by detecting latent conditions to reduce or halt their progression. Many risk factors for costly and disabling conditions (such as cardiovascular diseases, cancer, diabetes, and chronic respiratory diseases) can be prevented, yet healthcare systems do not make the best use of their available resources to support this process. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could offer a convenient and cost-effective way to support desirable health behaviours for preventive health care. To assess the effects of mobile phone messaging interventions as a mode of delivery for preventive health care, on health status and health behaviour outcomes. We searched: the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library 2009, Issue 2), MEDLINE (OvidSP) (January 1993 to June 2009), EMBASE (OvidSP) (January 1993 to June 2009), PsycINFO (OvidSP) (January 1993 to June 2009), CINAHL (EbscoHOST) (January 1993 to June 2009), LILACS (January 1993 to June 2009) and African Health Anthology (January 1993 to June 2009).We also reviewed grey literature (including trial registers) and reference lists of articles. We included randomised controlled trials (RCTs), quasi-randomised controlled trials (QRCTs), controlled before-after (CBA) studies, and interrupted time series (ITS) studies with at least three time points before and after the intervention. We included studies using SMS or MMS as a mode of delivery for any type of preventive health care. We only included studies in which it was possible to assess the effects of mobile phone messaging independent of other technologies or interventions. Two review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third review author. Study design features

  4. Encoding and decoding messages with chaotic lasers

    International Nuclear Information System (INIS)

    Alsing, P.M.; Gavrielides, A.; Kovanis, V.; Roy, R.; Thornburg, K.S. Jr.

    1997-01-01

    We investigate the structure of the strange attractor of a chaotic loss-modulated solid-state laser utilizing return maps based on a combination of intensity maxima and interspike intervals, as opposed to those utilizing Poincare sections defined by the intensity maxima of the laser (I=0,Ie<0) alone. We find both experimentally and numerically that a simple, intrinsic relationship exists between an intensity maximum and the pair of preceding and succeeding interspike intervals. In addition, we numerically investigate encoding messages on the output of a chaotic transmitter laser and its subsequent decoding by a similar receiver laser. By exploiting the relationship between the intensity maxima and the interspike intervals, we demonstrate that the method utilized to encode the message is vital to the system close-quote s ability to hide the signal from unwanted deciphering. In this work alternative methods are studied in order to encode messages by modulating the magnitude of pumping of the transmitter laser and also by driving its loss modulation with more than one frequency. copyright 1997 The American Physical Society

  5. Blind sensor calibration using approximate message passing

    International Nuclear Information System (INIS)

    Schülke, Christophe; Caltagirone, Francesco; Zdeborová, Lenka

    2015-01-01

    The ubiquity of approximately sparse data has led a variety of communities to take great interest in compressed sensing algorithms. Although these are very successful and well understood for linear measurements with additive noise, applying them to real data can be problematic if imperfect sensing devices introduce deviations from this ideal signal acquisition process, caused by sensor decalibration or failure. We propose a message passing algorithm called calibration approximate message passing (Cal-AMP) that can treat a variety of such sensor-induced imperfections. In addition to deriving the general form of the algorithm, we numerically investigate two particular settings. In the first, a fraction of the sensors is faulty, giving readings unrelated to the signal. In the second, sensors are decalibrated and each one introduces a different multiplicative gain to the measurements. Cal-AMP shares the scalability of approximate message passing, allowing us to treat large sized instances of these problems, and experimentally exhibits a phase transition between domains of success and failure. (paper)

  6. Antioxidant health messages in Canadian women's magazines.

    Science.gov (United States)

    Steinberg, Alissa; Paisley, Judy; Bandayrel, Kristofer

    2011-01-01

    Recently, antioxidants have taken centre stage in media and advertising messages. While 80% of Canadians think they are well-informed about nutrition, many are confused about the health effects of specific nutrients. Forty-six percent of Canadians seek information from newspapers and books, and 67% of women rely on magazines. We examined the content and accuracy of antioxidant health messages in Canadian women's magazines. The top three Canadian magazines targeted at women readers were selected. A screening tool was developed, pilot tested, and used to identify eligible articles. A coding scheme was created to define variables, which were coded and analyzed. Seventy-seven percent of 36 magazine issues contained articles that mentioned antioxidants (n=56). Seventy-one percent (n=40) of articles reported positive health effects related to antioxidant consumption, and 36% and 40% of those articles framed those effects as definite and potential, respectively (p<0.01). The articles sampled conveyed messages about positive antioxidant health effects that are not supported by current evidence. Improved standards of health reporting are needed. Nutrition professionals may need to address this inaccuracy when they develop communications on antioxidants and health risk.

  7. ZeroMQ: Messaging Made Simple

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  8. The influence of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages

    NARCIS (Netherlands)

    Moorman, M.; van den Putte, B.

    2008-01-01

    This study explores the combined effect of message framing, intention to quit smoking, and nicotine dependence on the persuasiveness of smoking cessation messages. Pre- and post-message measures of quit intention, attitude toward smoking cessation, and perceived behavioral control were taken in two

  9. Does perceived risk influence the effects of message framing? Revisiting the link between prospect theory and message framing

    NARCIS (Netherlands)

    Riet, J.P. van 't; Cox, A.D.; Cox, D.; Zimet, G.D.; Bruijn, G.J. de; Putte, B. van den; Vries, H. de; Werrij, M.Q.; Ruiter, R.A.C.

    2016-01-01

    Health-promoting messages can be framed in terms of the beneficial consequences of healthy behaviour (gain-framed messages) or the detrimental consequences of unhealthy behaviour (loss-framed messages). An influential notion holds that the perceived risk associated with the recommended behaviour

  10. Temporal networks

    Science.gov (United States)

    Holme, Petter; Saramäki, Jari

    2012-10-01

    A great variety of systems in nature, society and technology-from the web of sexual contacts to the Internet, from the nervous system to power grids-can be modeled as graphs of vertices coupled by edges. The network structure, describing how the graph is wired, helps us understand, predict and optimize the behavior of dynamical systems. In many cases, however, the edges are not continuously active. As an example, in networks of communication via e-mail, text messages, or phone calls, edges represent sequences of instantaneous or practically instantaneous contacts. In some cases, edges are active for non-negligible periods of time: e.g., the proximity patterns of inpatients at hospitals can be represented by a graph where an edge between two individuals is on throughout the time they are at the same ward. Like network topology, the temporal structure of edge activations can affect dynamics of systems interacting through the network, from disease contagion on the network of patients to information diffusion over an e-mail network. In this review, we present the emergent field of temporal networks, and discuss methods for analyzing topological and temporal structure and models for elucidating their relation to the behavior of dynamical systems. In the light of traditional network theory, one can see this framework as moving the information of when things happen from the dynamical system on the network, to the network itself. Since fundamental properties, such as the transitivity of edges, do not necessarily hold in temporal networks, many of these methods need to be quite different from those for static networks. The study of temporal networks is very interdisciplinary in nature. Reflecting this, even the object of study has many names-temporal graphs, evolving graphs, time-varying graphs, time-aggregated graphs, time-stamped graphs, dynamic networks, dynamic graphs, dynamical graphs, and so on. This review covers different fields where temporal graphs are considered

  11. ITER technical advisory committee meeting at Garching

    International Nuclear Information System (INIS)

    Fujiwara, M.

    1999-01-01

    The ITER Technical Advisory Committee meeting took place on 24-27 February at the Garching Joint Work Site. According to the discussions at the ITER meeting in Yokohama in October 1998, the Technical Advisory Committee was requested to conduct a thorough review of the document 'Options for the reduced technical objectives / reduced cost ITER'

  12. 78 FR 28594 - Advisory Committee Meeting

    Science.gov (United States)

    2013-05-15

    ... draft competitiveness report, and Ex-Im Bank economic impact policy update. Public Participation: The... EXPORT-IMPORT BANK OF THE UNITED STATES Advisory Committee Meeting ACTION: Notice of Open Meeting of the Advisory Committee of the Export- Import Bank of the United States (Ex-Im Bank). Time and...

  13. 75 FR 51026 - Environmental Management Advisory Board

    Science.gov (United States)

    2010-08-18

    ... DEPARTMENT OF ENERGY Environmental Management Advisory Board AGENCY: Department of Energy. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Environmental Management Advisory... EMAB is to provide the Assistant Secretary for Environmental Management (EM) with advice and...

  14. 78 FR 74174 - Humanities Panel Advisory Committee

    Science.gov (United States)

    2013-12-10

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Humanities Panel Advisory Committee AGENCY: National Endowment for the Humanities. ACTION: Notice of Charter Renewal for Humanities Panel Advisory... its implementing regulations, 41 CFR 102-3.65, the National Endowment for the Humanities (NEH) gives...

  15. 39 CFR 10.2 - Advisory service.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Advisory service. 10.2 Section 10.2 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE RULES OF CONDUCT FOR POSTAL SERVICE GOVERNORS (ARTICLE X) § 10.2 Advisory service. (a) The General Counsel is the Ethical...

  16. 75 FR 9886 - Methane Hydrate Advisory Committee

    Science.gov (United States)

    2010-03-04

    ... DEPARTMENT OF ENERGY Methane Hydrate Advisory Committee AGENCY: Department of Energy, Office of Fossil Energy. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Methane... the Committee: The purpose of the Methane Hydrate Advisory Committee is to provide advice on potential...

  17. 78 FR 41804 - NASA Advisory Council; Meeting.

    Science.gov (United States)

    2013-07-11

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: (13-077)] NASA Advisory Council; Meeting... Space Administration announces a meeting of the NASA Advisory Council (NAC). DATES: Wednesday, July 31... ADDRESSES: NASA Headquarters, Room 9H40, Program Review Center, 300 E Street SW., Washington, DC 20456 FOR...

  18. 75 FR 4588 - NASA Advisory Council; Meeting

    Science.gov (United States)

    2010-01-28

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 10-011] NASA Advisory Council; Meeting... Committee of the NASA Advisory Council. This will be the first meeting of this Committee. DATES: February 11, 2010--11 a.m.-1 p.m. (EST). Meet-Me-Number: 1-877-613-3958; 2939943. ADDRESSES: NASA Headquarters, 300...

  19. 76 FR 4133 - NASA Advisory Council; Meeting

    Science.gov (United States)

    2011-01-24

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: (11-007)] NASA Advisory Council; Meeting... Space Administration announces a meeting of the NASA Advisory Council. DATES: Thursday, February 10, 2011, 8 a.m.-5 p.m., Local Time. Friday, February 11, 2011, 8 a.m.-12 p.m., Local Time. ADDRESSES: NASA...

  20. 75 FR 5629 - NASA Advisory Council; Meeting

    Science.gov (United States)

    2010-02-03

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (10-019)] NASA Advisory Council; Meeting... Space Administration announces a meeting of the NASA Advisory Council. DATES: Thursday, February 18, 2010, 9 a.m.-5 p.m. EST; Friday, February 19, 2010, 9 a.m.-1 p.m., EST. ADDRESSES: NASA Headquarters...

  1. 77 FR 9997 - NASA Advisory Council; Meeting

    Science.gov (United States)

    2012-02-21

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (12-016)] NASA Advisory Council; Meeting... Space Administration announces a meeting of the NASA Advisory Council (NAC). DATES: Thursday, March 8, 2012, 8 a.m.-5 p.m., local time and Friday, March 9, 2012, 8 a.m.-12 p.m., local time. ADDRESSES: NASA...

  2. 75 FR 59747 - NASA Advisory Council; Meeting.

    Science.gov (United States)

    2010-09-28

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: (10-113)] NASA Advisory Council; Meeting. AGENCY: National Aeronautics and Space Administration. ACTION: Notice of meeting. SUMMARY: In accordance... Space Administration announces a meeting of the NASA Advisory Council. DATES: Wednesday, October 6, 2010...

  3. 75 FR 4875 - NASA Advisory Council; Meeting

    Science.gov (United States)

    2010-01-29

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (10-015)] NASA Advisory Council; Meeting... the NASA Advisory Council. This will be the first meeting of this Committee. DATES: February 17, 2010--10 a.m.-4 p.m. (EST). ADDRESSES: NASA Headquarters, 300 E Street, SW., Washington, DC, Room CD61. FOR...

  4. 76 FR 78252 - Nuclear Energy Advisory Committee

    Science.gov (United States)

    2011-12-16

    ... DEPARTMENT OF ENERGY Nuclear Energy Advisory Committee AGENCY: Department of Energy, Office of Nuclear Energy. ACTION: Notice of Renewal. SUMMARY: Pursuant to Section 14(a)(2)(A) of the Federal... hereby given that the Nuclear Energy Advisory Committee will be renewed for a two-year period. The...

  5. 76 FR 67717 - Nuclear Energy Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF ENERGY Nuclear Energy Advisory Committee AGENCY: Department of Energy, Office of Nuclear Energy. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Nuclear...: [email protected]nuclear.energy.gov . SUPPLEMENTARY INFORMATION: Background: The Nuclear Energy Advisory...

  6. 77 FR 26274 - Nuclear Energy Advisory Committee

    Science.gov (United States)

    2012-05-03

    ... DEPARTMENT OF ENERGY Nuclear Energy Advisory Committee AGENCY: Department of Energy, Office of Nuclear Energy. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Nuclear[email protected]nuclear.energy.gov . SUPPLEMENTARY INFORMATION: Background: The Nuclear Energy Advisory Committee...

  7. 78 FR 70932 - Nuclear Energy Advisory Committee

    Science.gov (United States)

    2013-11-27

    ... DEPARTMENT OF ENERGY Nuclear Energy Advisory Committee AGENCY: Office of Nuclear Energy, Department of Energy. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Nuclear[email protected]nuclear.energy.gov . SUPPLEMENTARY INFORMATION: Background: The Nuclear Energy Advisory Committee (NEAC...

  8. 78 FR 76599 - Nuclear Energy Advisory Committee

    Science.gov (United States)

    2013-12-18

    ... DEPARTMENT OF ENERGY Nuclear Energy Advisory Committee AGENCY: Office of Nuclear Energy..., General Services Administration, notice is hereby given that the Nuclear Energy Advisory Committee (NEAC... to the Department of Energy's Office of Nuclear Energy on complex science and technical issues that...

  9. 75 FR 67351 - Nuclear Energy Advisory Committee

    Science.gov (United States)

    2010-11-02

    ... DEPARTMENT OF ENERGY Nuclear Energy Advisory Committee AGENCY: Office of Nuclear Energy, Department of Energy. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Nuclear... [email protected]nuclear.energy.gov . SUPPLEMENTARY INFORMATION: Background: The Nuclear Energy Advisory...

  10. 75 FR 13269 - Nuclear Energy Advisory Committee

    Science.gov (United States)

    2010-03-19

    ... DEPARTMENT OF ENERGY Nuclear Energy Advisory Committee AGENCY: Department of Energy, Office of Nuclear Energy. ACTION: Notice of open meeting. SUMMARY: This notice announces a meeting of the Nuclear[email protected]nuclear.energy.gov . SUPPLEMENTARY INFORMATION: Background: The Nuclear Energy Advisory Committee...

  11. 78 FR 70987 - Proxy Advisory Firm Roundtable

    Science.gov (United States)

    2013-11-27

    ... Firm Roundtable AGENCY: Securities and Exchange Commission. ACTION: Notice of roundtable discussion... advisory firms. The panel will be asked to discuss topics including the current state of proxy advisory firm use by investment advisers and institutional investors and potential changes that have been...

  12. 78 FR 57174 - Advisory Committee Meeting

    Science.gov (United States)

    2013-09-17

    ... recommended for inclusion on future Joint Board examinations in actuarial mathematics, pension law and... Advisory Committee on Actuarial Examinations. DATES: The meeting will be held on October 18, 2013, from 8.... SUPPLEMENTARY INFORMATION: Notice is hereby given that the Advisory Committee on Actuarial Examinations will...

  13. 78 FR 23773 - Chemical Transportation Advisory Committee

    Science.gov (United States)

    2013-04-22

    ... of Hazardous Solid Bulk Residue b. Update on International Maritime Organization as it relates to the... Advisory Committee AGENCY: Coast Guard, DHS. ACTION: Committee Management; Notice of Federal Advisory... avoid delays in processing.) Fax: 202-493-2252. Mail: Docket Management Facility (M-30), U.S. Department...

  14. 75 FR 28542 - Superior Resource Advisory Committee

    Science.gov (United States)

    2010-05-21

    ... Self-Determination Act (Pub. L. 110-343) and in compliance with the Federal Advisory Committee Act. The purpose of the meeting is to orient the new Superior Resource Advisory Committee members on their roles... following business will be conducted: Overview of the roles and responsibilities of the Superior Resource...

  15. Explor@ Advisory Agent: Tracing the Student's Trail.

    Science.gov (United States)

    Lundgren-Cayrol, Karin; Paquette, Gilbert; Miara, Alexis; Bergeron, Frederick; Rivard, Jacques; Rosca, Ioan

    This paper presents research and development of an adaptive World Wide Web-based system called Explor@ Advisory Agent, capable of tailoring advice to the individual student's needs, actions, and reactions toward pedagogical events, as well as according to diagnosis of content acquisition. Explor@ Advisory Agent consists of two sub-systems, the…

  16. Advisory Boards: Gateway to Business Engagement

    Science.gov (United States)

    Meeder, Hans; Pawlowski, Brett

    2012-01-01

    Interest has been growing in how to build or manage an effective business advisory board. Developing an advisory board is crucial to keeping CTE programs relevant and viable by engaging the support of business and industry. This article delves into how to build and manage a board, and how to re-energize boards that already exist but may be lacking.

  17. 75 FR 56146 - Arts Advisory Panel; Meetings

    Science.gov (United States)

    2010-09-15

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES National Endowment for the Arts Arts Advisory... amended, notice is hereby given that four meetings of the Arts Advisory Panel to the National Council on the Arts will be held at the Nancy Hanks Center, 1100 Pennsylvania Avenue, NW., Washington, DC 20506...

  18. 78 FR 42982 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2013-07-18

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of Meetings SUMMARY... hereby given one meeting of the Arts Advisory Panel to the National Council on the Arts will be held at...

  19. 77 FR 61643 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2012-10-10

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of meeting. SUMMARY... hereby given that sixteen meetings of the Arts Advisory Panel to the National Council on the Arts will be...

  20. 78 FR 17942 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2013-03-25

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of meetings. SUMMARY... hereby given that five meetings of the Arts Advisory Panel to the National Council on the Arts will be...

  1. 78 FR 59978 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2013-09-30

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of meeting. SUMMARY... hereby given that one meeting of the Arts Advisory Panel to the National Council on the Arts will be held...

  2. 77 FR 49026 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2012-08-15

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of meeting. SUMMARY... hereby given that one meeting of the Arts Advisory Panel to the National Council on the Arts will be held...

  3. 78 FR 21978 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2013-04-12

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of meeting. SUMMARY... is hereby given that one meeting of the Arts Advisory Panel to the National Council on the Arts will...

  4. 78 FR 26399 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2013-05-06

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of Meeting. SUMMARY... hereby given that one meeting of the Arts Advisory Panel to the National Council on the Arts will be held...

  5. 77 FR 13154 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2012-03-05

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice--meeting. Pursuant to... given that a meeting of the Arts Advisory Panel to the National Council on the Arts will be held by...

  6. 77 FR 67836 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2012-11-14

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of Meeting. SUMMARY... hereby given that fifteen meetings of the Arts Advisory Panel to the National Council on the Arts will be...

  7. 78 FR 5213 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2013-01-24

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of meeting. SUMMARY... hereby given that one meeting of the Arts Advisory Panel to the National Council on the Arts will be held...

  8. 77 FR 75672 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2012-12-21

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of Meeting. SUMMARY... hereby given that seven meetings of the Arts Advisory Panel to the National Council on the Arts will be...

  9. 77 FR 41808 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2012-07-16

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of meeting. SUMMARY... hereby given that two meetings of the Arts Advisory Panel to the National Council on the Arts will be...

  10. 78 FR 68099 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2013-11-13

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of Meeting. SUMMARY... hereby given that twenty- one meetings of the Arts Advisory Panel to the National Council on the Arts...

  11. 78 FR 50451 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2013-08-19

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of Meetings. SUMMARY... hereby given that one meeting of the Arts Advisory Panel to the National Council on the Arts will be held...

  12. 77 FR 56875 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2012-09-14

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of meeting. SUMMARY... hereby given that two meetings of the Arts Advisory Panel to the National Council on the Arts will be...

  13. 77 FR 13367 - Arts Advisory Panel Meeting

    Science.gov (United States)

    2012-03-06

    ... NATIONAL FOUNDATION ON THE ARTS AND THE HUMANITIES Arts Advisory Panel Meeting AGENCY: National Endowment for the Arts, National Foundation on the Arts and Humanities. ACTION: Notice of meeting. SUMMARY... hereby given that a meeting of the Arts Advisory Panel to the National Council on the Arts will be held...

  14. The prototype message broadcast system for the Superconducting Super Collider

    International Nuclear Information System (INIS)

    Low, K.; Skegg, R.

    1990-11-01

    A prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider is presented. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system. A simple version of this system is to be used in the Accelerator Systems String Test (ASST) at the SSC site in 1991. 3 refs., 6 figs., 1 tab

  15. The prototype message broadcast system for the superconducting super collider

    International Nuclear Information System (INIS)

    Low, K.; Skegg, R.

    1991-01-01

    This paper presents a prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system

  16. 76 FR 52642 - Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group

    Science.gov (United States)

    2011-08-23

    ... DEPARTMENT OF DEFENSE Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group AGENCY: Department of Defense. ACTION: Notice of Advisory Committee closed meeting.... Strategic Command Strategic Advisory Group. DATES: November 1, 2011, from 8 a.m. to 5 p.m. and November 2...

  17. Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System

    Directory of Open Access Journals (Sweden)

    Ashraf A. Tahat

    2009-01-01

    Full Text Available A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  18. Mobile messaging services-based personal electrocardiogram monitoring system.

    Science.gov (United States)

    Tahat, Ashraf A

    2009-01-01

    A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  19. Weighted community detection and data clustering using message passing

    Science.gov (United States)

    Shi, Cheng; Liu, Yanchen; Zhang, Pan

    2018-03-01

    Grouping objects into clusters based on the similarities or weights between them is one of the most important problems in science and engineering. In this work, by extending message-passing algorithms and spectral algorithms proposed for an unweighted community detection problem, we develop a non-parametric method based on statistical physics, by mapping the problem to the Potts model at the critical temperature of spin-glass transition and applying belief propagation to solve the marginals corresponding to the Boltzmann distribution. Our algorithm is robust to over-fitting and gives a principled way to determine whether there are significant clusters in the data and how many clusters there are. We apply our method to different clustering tasks. In the community detection problem in weighted and directed networks, we show that our algorithm significantly outperforms existing algorithms. In the clustering problem, where the data were generated by mixture models in the sparse regime, we show that our method works all the way down to the theoretical limit of detectability and gives accuracy very close to that of the optimal Bayesian inference. In the semi-supervised clustering problem, our method only needs several labels to work perfectly in classic datasets. Finally, we further develop Thouless-Anderson-Palmer equations which heavily reduce the computation complexity in dense networks but give almost the same performance as belief propagation.

  20. Manipulative Use of Short Messaging Service (SMS Text Messages by Nigerian Telecommunications Companies

    Directory of Open Access Journals (Sweden)

    Ayoola, Kehinde A.

    2014-02-01

    Full Text Available This paper is an application of Relevance Theory for the interpretation of short messaging service (SMS text messages emanating from Nigerian telecommunications companies to their subscribers. The aim of the research was to identify and describe the manipulative strategies employed by Nigerian telecommunications companies to induce subscribers to part with their money through sales promotion lotteries. 100 SMS texts were purposively extracted from the cell phones of randomly selected residents of Lagos Nigeria who had received promotional SMS text messages from three major Nigerian telecommunications companies. Using Sperber and Wilson's Relevance Theory (1995 as its theoretical framework, the paper described the manipulative use of SMS by Nigerian telecommunications companies. The analysis revealed that SMS text messages were encoded to achieve maximization of relevance through explicature and implicature; contextual implication and strengthening; and the reduction of processing effort through violating the maxim of truthfulness and the creative use of graphology. The paper concludes that SMS text-messages were used manipulatively by Nigerian telecommunications companies to earn indirect income from sales promotion lottery.

  1. Engineered cell-cell communication via DNA messaging

    Directory of Open Access Journals (Sweden)

    Ortiz Monica E

    2012-09-01

    Full Text Available Abstract Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia.

  2. TXT@WORK: pediatric hospitalists and text messaging.

    Science.gov (United States)

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Steinberger, Erik

    2014-07-01

    Many studies assess provider-patient communication through text messaging; however, minimal research has addressed communication among physicians. The purpose of this study was to evaluate the use of text messaging by pediatric hospitalists. A brief, anonymous, electronic survey was distributed through the American Academy of Pediatrics Section on Hospital Medicine Listserv in February 2012. Survey questions assessed work-related text messaging. Of the 106 pediatric hospitalist respondents, 97 met inclusion criteria. Most were female (73%) and had been in practice text messages, some (12%) more than 10 times per shift. More than half (53%) received work-related text messages when not at work. When asked to identify all potential work recipients, most often sent work-related text messages to other pediatric hospitalists (64%), fellows or resident physicians (37%), and subspecialists/consulting physicians (28%). When asked their preferred mode for brief communication, respondents' preferences varied. Many (46%) respondents worried privacy laws can be violated by sending/receiving text messages, and some (30%) reported having received protected health information (PHI) through text messages. However, only 11% reported their institution offered encryption software for text messaging. Physicians were using text messaging as a means of brief, work-related communication. Concerns arose regarding transfer of PHI using unsecure systems and work-life balance. Future research should examine accuracy and effectiveness of text message communication in the hospital, as well as patient privacy issues.

  3. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  4. System of message for gamma-radiation monitor

    International Nuclear Information System (INIS)

    Bolic, M.D.; Koturovic, A.M.

    2001-01-01

    Paper describes a system of voice messages for gamma-radiation monitor based on PC. The systems reproduces recorded messages that is simpler than the process of their synthesis. Message choice is based on combination of recorded digital results and/or received reference messages or warnings. The system of generation of voice messages applies the Windows based software. The total memory array required to create independent voice system is maximum 1.7 mbyte. The monitor may be used for continuous monitoring of radioactivity level with 5-8 s period of message repetition. Another option of the system operation is based on monitor application for the environment monitoring. Period of messages in this case is equal to 5-30 min [ru

  5. SDN-enabled hybrid emergency message transmission architecture in internet-of-vehicles

    Science.gov (United States)

    Zhu, Wanting; Gao, Deyun; Zhao, Weicheng; Zhang, Hongke; Chiang, Hua-Pei

    2018-04-01

    With the increasing number of vehicles connected to the Internet-of-Things (IoT), Internet-of-Vehicles (IoV) is becoming a hot research topic. It can improve traffic safety and efficiency and promote the development of the intelligent transportation that is a very important element in Smart Cities. As an important part of the safety application in IoV, the emergency message transmission is designed to inform all the vehicles in the relevant area timely of the accident information through the multi-hop broadcast communication. In this paper, we propose a hybrid emergency message transmission (HEMT), which introduces the SDN technology into the vehicular network environment and utilizes the flexibility of inter-vehicle communication. By deploying SDN-enabled central controller and RSU switches, we can obtain reliable and fast emergency message dissemination. Moreover, considering the space between the coverages of RSUs caused by the sparse deployment, we also use inter-vehicle multi-hop broadcast communication to improve the message coverage ratio by adding the packet modification module on the RSU switch. Simulation results show the feasibility and effectiveness of our proposed scheme.

  6. 77 FR 17475 - Notification of Public Teleconferences of the Science Advisory Board; Environmental Economics...

    Science.gov (United States)

    2012-03-26

    ... Advisory Board; Environmental Economics Advisory Committee AGENCY: Environmental Protection Agency (EPA... Office announces public teleconferences of the SAB Environmental Economics Advisory Committee to conduct... Economics Advisory Committee (EEAC) will hold a public teleconferences to review the EPA draft report...

  7. 77 FR 45604 - Notification of Two Public Teleconferences of the Science Advisory Board; Environmental Economics...

    Science.gov (United States)

    2012-08-01

    ... Science Advisory Board; Environmental Economics Advisory Committee AGENCY: Environmental Protection Agency...) Staff Office announces two public teleconferences of the SAB Environmental Economics Advisory Committee...., notice is hereby given that the SAB Environmental Economics Advisory Committee (EEAC) will hold public...

  8. 47 CFR 11.20 - State Relay Network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false State Relay Network. 11.20 Section 11.20... Network. This network is composed of State Relay (SR) sources, leased common carrier communications facilities or any other available communication facilities. The network distributes State EAS messages...

  9. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages

    Science.gov (United States)

    Cole, Galen E.; Keller, Punam A.; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-01-01

    The Centers for Disease Control and Prevention’s Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces. PMID:26877714

  10. When communications collide with recipients' actions: effects of post-message behavior on intentions to follow the message recommendation.

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B; Kumkale, G Tarcan

    2003-07-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance.

  11. When Communications Collide With Recipients’ Actions: Effects of Post-Message Behavior on Intentions to Follow the Message Recommendation

    Science.gov (United States)

    Albarracín, Dolores; Cohen, Joel B.; Kumkale, G. Tarcan

    2013-01-01

    Two experiments investigated the processes through which post-message behavior (e.g., noncompliance) influences resistance to the message. Participants in Experiment 1 read preventive, consumer-education messages that either opposed the consumption of an alcohol-like product or recommended moderation. Half of the participants then tried the product, whereas the remaining participants performed a filler task. In the absence of trial, the two messages had the same effect. However, recipients of the abstinence-promoting preventive message who tried the product had stronger intentions to use the product in the future than recipients of the moderation message. This finding suggests that assessments of message impact may be inadequate unless an opportunity for trial is also provided. Results are interpreted in terms of self-perception and cognitive dissonance and contrasted from psychological reactance. PMID:15018672

  12. CDC MessageWorks: Designing and Validating a Social Marketing Tool to Craft and Defend Effective Messages.

    Science.gov (United States)

    Cole, Galen E; Keller, Punam A; Reynolds, Jennifer; Schaur, Michelle; Krause, Diane

    2016-03-01

    The Centers for Disease Control and Prevention's Division of Cancer Prevention and Control, in partnership with Oak Ridge Associated Universities, designed an online social marketing strategy tool, MessageWorks, to help health communicators effectively formulate messages aimed at changing health behaviors and evaluate message tactics and audience characteristics. MessageWorks is based on the advisor for risk communication model that identifies 10 variables that can be used to predict target audience intentions to comply with health recommendations. This article discusses the value of the MessageWorks tool to health communicators and to the field of social marketing by (1) describing the scientific evidence supporting use of MessageWorks to improve health communication practice and (2) summarizing how to use MessageWorks and interpret the results it produces.

  13. Online and Offline Social Networks: Use of Social Networking Sites by Emerging Adults

    Science.gov (United States)

    Subrahmanyam, Kaveri; Reich, Stephanie M.; Waechter, Natalia; Espinoza, Guadalupe

    2008-01-01

    Social networking sites (e.g., MySpace and Facebook) are popular online communication forms among adolescents and emerging adults. Yet little is known about young people's activities on these sites and how their networks of "friends" relate to their other online (e.g., instant messaging) and offline networks. In this study, college students…

  14. Getting your message out with social marketing.

    Science.gov (United States)

    Manoff, R K

    1997-09-01

    This article was based on a speech presented at a Plenary Session of the 1996 Annual Meeting of the American Society of Tropical Medicine and Hygiene. The address describes the nature of social marketing with examples and some lessons learned in developing countries. The earliest social marketers were Moses with the Ten Commandments of God and Indian religious authorities with fertility motifs inscribed on temple walls. Modern marketers of beer and snack food preempted the ancients and made social marketing more ingenious. The strategy shifted to supplying a product to satisfy a consumer want. Messages became a two-way process that minimized feedback shock. Focus groups were used to probe consumers' thoughts. Research must probe the total environment of the "problem." In Brazil, breast feeding promotions revealed that the perceived problem may not be the real problem, and there was no single magic solution. Most tropical disease prevention approaches do not rely on multistage strategies. The oral rehydration therapy (ORT) strategy became a world-wide model when strategists realized that the formula had to be easy to remember, diarrhea had to be recognized as a disease, and the function of ORT had to be clearly defined. The Bangladesh Social Marketing Campaign was successful in getting men to discuss family planning with their wives and establishing the family planning worker as a heroine. Effective messages must uncover points of resistance to the message. Public health advances in the 19th century were due to social policy to improve water supply, sanitation, and nutrition. The iodization of salt in Ecuador was possible with political will, public awareness, redirection of perception, and motivation of demand. Social marketing resources exist in all countries nowadays. Only medical and scientific professionals can promote concern about tropical diseases and raise the prevention priority on the public agenda.

  15. Electronic folklore among teenagers: SMS messages

    Directory of Open Access Journals (Sweden)

    Cvjetićanin Tijana

    2006-01-01

    Full Text Available The development of ICT media made way for a new form of folklore communication. Newly developed media, such as mobile phones, make it possible for their users to participate in electronically mediated communication, thus approaching the form of oral communication. The exchange of special type of SMS text messages represents a new way of transmitting contemporary folklore short forms. These messages use poetic language, they have standard style themes, patterns and formulas, and they form different genres and categories corresponding with already existing familiar folklore forms. The communication process that happens during the exchange of these messages also has folklore’s characteristics: it takes place within small groups, the communication is informal, the texts circulate in chain style, and undergo different transformation which generates the making of variants, etc. This form of electronic folklore is especially popular among teenagers, where it’s social functions and meanings are also most emphasized. Within this population, it adds to an older tradition of children’s written folklore poetry albums. Like poetry albums, SMS exchange influences the development of girls’ gender identity, providing also a socially defined channel for contacts between the sexes. It also functions as a mechanism of socialization and stratification within the group. At the same time, it creates a new field of meaning, which derives from the very media’s novelty and significance. In this sense, the exchange of SMS represents a symbolic act of acknowledging one’s belonging to the group of mobile telephone users. In this way, a new phenomenon is being symbolically processed through a new form of folklore.

  16. Research on Innovating, Applying Multiple Paths Routing Technique Based on Fuzzy Logic and Genetic Algorithm for Routing Messages in Service - Oriented Routing

    Directory of Open Access Journals (Sweden)

    Nguyen Thanh Long

    2015-02-01

    Full Text Available MANET (short for Mobile Ad-Hoc Network consists of a set of mobile network nodes, network configuration changes very fast. In content based routing, data is transferred from source node to request nodes is not based on destination addresses. Therefore, it is very flexible and reliable, because source node does not need to know destination nodes. If We can find multiple paths that satisfies bandwidth requirement, split the original message into multiple smaller messages to transmit concurrently on these paths. On destination nodes, combine separated messages into the original message. Hence it can utilize better network resources, causes data transfer rate to be higher, load balancing, failover. Service Oriented Routing is inherited from the model of content based routing (CBR, combined with several advanced techniques such as Multicast, multiple path routing, Genetic algorithm to increase the data rate, and data encryption to ensure information security. Fuzzy logic is a logical field study evaluating the accuracy of the results based on the approximation of the components involved, make decisions based on many factors relative accuracy based on experimental or mathematical proof. This article presents some techniques to support multiple path routing from one network node to a set of nodes with guaranteed quality of service. By using these techniques can decrease the network load, congestion, use network resources efficiently.

  17. Real Time Assessment of Young Adults' Attitudes toward Tobacco Messages.

    Science.gov (United States)

    Hébert, Emily T; Vandewater, Elizabeth A; Businelle, Michael S; Harrell, Melissa B; Kelder, Steven H; Perry, Cheryl L

    2018-01-01

    We used ecological momentary assessment (EMA) to examine young adults' attitudes towards pro-tobacco messages encountered in real time and their association with intentions to use tobacco. Young adults (N = 92, ages 18-29) recorded sightings of marketing or social media related to tobacco in real time via mobile app for 28 days. Participants reported message characteristics, their attitudes towards the message, and intentions to use the depicted product for each submission. We used generalized linear mixed models to examine factors related to attitude towards message and intentions to use tobacco. Messages depicting e-cigarettes (p < .001) or hookah (p < .05) were associated with significantly more favorable attitudes compared with traditional cigarettes. Positive attitude towards the message was significantly associated with intention to use the depicted product (p < .001). Messages depicting e-cigarettes and hookah were significantly associated with higher intention to use. Message source was not significantly related to attitudes towards the message or product use intentions. Marketing featuring e-cigarettes and hookah is an important target for future regulation. Given that pro-tobacco and e-cigarette messages are prevalent online, future research should consider the Internet and social media as important venues for counter-marketing and intervention efforts.

  18. The religious message in action - a case study

    Directory of Open Access Journals (Sweden)

    René Gothóni

    1975-01-01

    Full Text Available We understand a religious message to be the product of a religious movement. In studying such a message, it is very much to the purpose to place it in the context in which it operates. The cultural and social context of a religious message is some religious movement. Hence, the message should be examined against that framework. Each message has a certain structure, and its detection is of prime importance. Messages are not only part of the tradition, but themselves unique in their respective communicative situations. Thus, in our view, structural analysis does not have analytical use-value unless the message's symbols are set into their communicative context. The aim of this paper is dual: On the one hand, we intend to analyze and clarify the structure of a religious message of the Laestadian movement, how the message operates, also how the members of that movement respond to the codes of the message, and what kind of functions it fulfills; on the other, to develop and test an analytical model which would combine structural and interactional analysis.

  19. Counselling young cannabis users by text message

    DEFF Research Database (Denmark)

    Laursen, Ditte

    2010-01-01

    This article presents the results of a study of two SMS services aimed at providing young people with information on cannabis and helping them to reduce their consumption of the drug. The attitude of the 12 participants in the study towards the SMS services is generally positive, but they prefer...... factual information to advice and counselling. The messages prompt reflection and awareness among the recipients, and their repetitive, serial nature plays a significant part in the process of change. This is especially true of the young people whose use of cannabis is recreational. For them, the SMS...

  20. Neuroscience and education: myths and messages.

    Science.gov (United States)

    Howard-Jones, Paul A

    2014-12-01

    For several decades, myths about the brain - neuromyths - have persisted in schools and colleges, often being used to justify ineffective approaches to teaching. Many of these myths are biased distortions of scientific fact. Cultural conditions, such as differences in terminology and language, have contributed to a 'gap' between neuroscience and education that has shielded these distortions from scrutiny. In recent years, scientific communications across this gap have increased, although the messages are often distorted by the same conditions and biases as those responsible for neuromyths. In the future, the establishment of a new field of inquiry that is dedicated to bridging neuroscience and education may help to inform and to improve these communications.